00000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x63660400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x892f, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1056.296682][T18375] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1056.311356][T18365] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1056.398717][T18365] team367: entered promiscuous mode [ 1056.405401][T18365] 8021q: adding VLAN 0 to HW filter on device team367 [ 1056.536963][T18370] gre299: entered promiscuous mode [ 1056.545117][T18370] team367: Port device gre299 added [ 1056.558511][T18379] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1056.577426][ T5045] usb 5-1: reset high-speed USB device number 21 using dummy_hcd [ 1056.593259][T18379] team372: entered promiscuous mode [ 1056.598883][T18379] 8021q: adding VLAN 0 to HW filter on device team372 [ 1056.718479][T18382] gre303: entered promiscuous mode [ 1056.725329][T18382] team372: Port device gre303 added [ 1056.872612][T18389] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1056.889868][T18389] team358: entered promiscuous mode [ 1056.895228][T18389] 8021q: adding VLAN 0 to HW filter on device team358 [ 1056.979647][T18390] gre291: entered promiscuous mode [ 1056.999924][T18390] team358: Port device gre291 added [ 1057.427519][ T5045] keytouch 0003:0926:3333.0067: usb_submit_urb(out) failed: -90 [ 1057.630848][ T5045] usb 5-1: USB disconnect, device number 21 20:09:48 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, &(0x7f00000000c0)={0x40, 0x0, 0x50, {0x50, 0x7, "6b1615014ca35e3ab1aa4965d2ebcfbbcd0e9a17b85658fda1f7d2bb5277ee36d6cc0bde070817ea368477c4ab970460a482a9b7958fc0e82bfdb50cb7a723ba553cc44af11611756d506c208129"}}, &(0x7f0000000040)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0xc1a}}, &(0x7f0000000140)={0x0, 0x22, 0x6, {[@local=@item_4={0x3, 0x2, 0x8, "1ed505a6"}, @local=@item_012={0x0, 0x2, 0x7}]}}, &(0x7f0000000180)={0x0, 0x21, 0x9, {0x9, 0x21, 0xfff8, 0x0, 0x1, {0x22, 0x64b}}}}, &(0x7f0000000440)={0x2c, &(0x7f0000000280)={0x0, 0x0, 0x85, "23ad3b1b343bf28c5d550b539f2ac418235ada00a2231649d2abe1e3e9615cceed2286761bec5ac56f31f49d9fa552cb9dbb5b21b1755a4d6ae3b3de82533f8a5ba44efdd9625f865a9b9f68cf8a4de7e2d9b7bea7aa993bc67ced31feaa5176f1a102a5e19379df736d74bfc79dd5539d9f8b8f6451de65d1ce920c3dc4f7b0229a7f94f6"}, &(0x7f0000000200)={0x0, 0xa, 0x1, 0x36}, &(0x7f0000000340)={0x0, 0x8, 0x1}, &(0x7f0000000380)={0x20, 0x1, 0x67, "490602a688733e960a77688ef40264eb26557e0659aa57794203fc26c75bb1795d64b89385864c04b790430be0b5f4ff3647fb0455a7f66b3cc375bc06d8217c87f001c64177092528594c0c1b5d15da35bcfb33cd62131f17fa9c2a0bd0b9c774828b0c283abf"}, &(0x7f0000000400)={0x20, 0x3, 0x1, 0x7}}) syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) (async) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, &(0x7f00000000c0)={0x40, 0x0, 0x50, {0x50, 0x7, "6b1615014ca35e3ab1aa4965d2ebcfbbcd0e9a17b85658fda1f7d2bb5277ee36d6cc0bde070817ea368477c4ab970460a482a9b7958fc0e82bfdb50cb7a723ba553cc44af11611756d506c208129"}}, &(0x7f0000000040)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0xc1a}}, &(0x7f0000000140)={0x0, 0x22, 0x6, {[@local=@item_4={0x3, 0x2, 0x8, "1ed505a6"}, @local=@item_012={0x0, 0x2, 0x7}]}}, &(0x7f0000000180)={0x0, 0x21, 0x9, {0x9, 0x21, 0xfff8, 0x0, 0x1, {0x22, 0x64b}}}}, &(0x7f0000000440)={0x2c, &(0x7f0000000280)={0x0, 0x0, 0x85, "23ad3b1b343bf28c5d550b539f2ac418235ada00a2231649d2abe1e3e9615cceed2286761bec5ac56f31f49d9fa552cb9dbb5b21b1755a4d6ae3b3de82533f8a5ba44efdd9625f865a9b9f68cf8a4de7e2d9b7bea7aa993bc67ced31feaa5176f1a102a5e19379df736d74bfc79dd5539d9f8b8f6451de65d1ce920c3dc4f7b0229a7f94f6"}, &(0x7f0000000200)={0x0, 0xa, 0x1, 0x36}, &(0x7f0000000340)={0x0, 0x8, 0x1}, &(0x7f0000000380)={0x20, 0x1, 0x67, "490602a688733e960a77688ef40264eb26557e0659aa57794203fc26c75bb1795d64b89385864c04b790430be0b5f4ff3647fb0455a7f66b3cc375bc06d8217c87f001c64177092528594c0c1b5d15da35bcfb33cd62131f17fa9c2a0bd0b9c774828b0c283abf"}, &(0x7f0000000400)={0x20, 0x3, 0x1, 0x7}}) (async) 20:09:48 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 16) 20:09:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x4, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:09:48 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x76000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:48 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xcb720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:48 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x64660400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1058.171521][T18396] FAULT_INJECTION: forcing a failure. [ 1058.171521][T18396] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1058.183546][T18399] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1058.193237][T18396] CPU: 0 PID: 18396 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1058.204437][T18396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1058.214537][T18396] Call Trace: [ 1058.217931][T18396] [ 1058.220862][T18396] dump_stack_lvl+0x125/0x1b0 [ 1058.225542][T18396] should_fail_ex+0x496/0x5b0 [ 1058.230230][T18396] __should_fail_alloc_page+0xe7/0x130 [ 1058.235705][T18396] prepare_alloc_pages.constprop.0+0x16f/0x550 [ 1058.241904][T18396] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1058.247905][T18396] __alloc_pages+0x14e/0x4a0 [ 1058.252605][T18396] ? __alloc_pages_slowpath.constprop.0+0x2360/0x2360 [ 1058.259392][T18396] ? find_held_lock+0x2d/0x110 [ 1058.264173][T18396] ? reacquire_held_locks+0x4b0/0x4b0 [ 1058.269562][T18396] __folio_alloc+0x16/0x40 [ 1058.273995][T18396] vma_alloc_folio+0x156/0x890 [ 1058.278764][T18396] ? policy_nodemask+0x1d0/0x1d0 [ 1058.283707][T18396] ? __anon_vma_prepare+0x298/0x550 [ 1058.288921][T18396] __handle_mm_fault+0x12a8/0x3b80 [ 1058.294045][T18396] ? vm_iomap_memory+0x170/0x170 [ 1058.299015][T18396] ? find_vma+0x10e/0x1b0 [ 1058.303349][T18396] ? vma_link+0x290/0x290 [ 1058.307679][T18396] handle_mm_fault+0x2ab/0x9d0 [ 1058.312480][T18396] ? access_error+0x156/0x2d0 [ 1058.317156][T18396] ? lock_mm_and_find_vma+0xa6/0x760 [ 1058.322448][T18396] do_user_addr_fault+0x446/0xfc0 [ 1058.327497][T18396] ? rcu_is_watching+0x12/0xb0 [ 1058.332284][T18396] exc_page_fault+0x5c/0xd0 [ 1058.336814][T18396] asm_exc_page_fault+0x26/0x30 [ 1058.341666][T18396] RIP: 0033:0x7ffba0828643 [ 1058.346076][T18396] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 1058.365701][T18396] RSP: 002b:00007ffba159a520 EFLAGS: 00010206 20:09:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1058.371770][T18396] RAX: 0000000000000000 RBX: 00007ffba159a5c0 RCX: 00007ffb96fff000 [ 1058.379736][T18396] RDX: 00007ffba159a760 RSI: 0000000000000001 RDI: 00007ffba159a660 [ 1058.387707][T18396] RBP: 0000000000000139 R08: 0000000000000007 R09: 0000000000000046 [ 1058.395685][T18396] R10: 0000000000000054 R11: 00007ffba159a5c0 R12: 00007ffba159a5c0 [ 1058.403658][T18396] R13: 00007ffba08ea360 R14: 000000000000002d R15: 00007ffba159a660 [ 1058.411731][T18396] 20:09:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1058.447569][T18396] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 1058.454477][T18399] team359: entered promiscuous mode [ 1058.461154][T18399] 8021q: adding VLAN 0 to HW filter on device team359 [ 1058.461925][T18396] loop0: detected capacity change from 0 to 24 [ 1058.483125][T18396] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1058.490459][T18396] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:09:48 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 17) [ 1058.497456][T18401] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:09:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1058.560263][T18401] team368: entered promiscuous mode [ 1058.575235][T18401] 8021q: adding VLAN 0 to HW filter on device team368 [ 1058.600293][T18413] FAULT_INJECTION: forcing a failure. 20:09:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x2, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1058.600293][T18413] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1058.645586][T18413] CPU: 0 PID: 18413 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1058.656336][T18413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1058.666413][T18413] Call Trace: [ 1058.669704][T18413] [ 1058.672640][T18413] dump_stack_lvl+0x125/0x1b0 [ 1058.677345][T18413] should_fail_ex+0x496/0x5b0 [ 1058.682047][T18413] __should_fail_alloc_page+0xe7/0x130 [ 1058.687614][T18413] prepare_alloc_pages.constprop.0+0x16f/0x550 [ 1058.693802][T18413] __alloc_pages+0x14e/0x4a0 [ 1058.698423][T18413] ? __alloc_pages_slowpath.constprop.0+0x2360/0x2360 [ 1058.705221][T18413] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1058.711240][T18413] alloc_pages+0x1a9/0x270 [ 1058.715699][T18413] pte_alloc_one+0x1a/0x240 [ 1058.720330][T18413] __pte_alloc+0x6e/0x270 [ 1058.724702][T18413] ? pmd_install+0x170/0x170 [ 1058.729333][T18413] ? find_held_lock+0x59/0x110 [ 1058.734128][T18413] __handle_mm_fault+0x3463/0x3b80 [ 1058.739374][T18413] ? vm_iomap_memory+0x170/0x170 [ 1058.741206][T12655] usb 5-1: new high-speed USB device number 22 using dummy_hcd [ 1058.744409][T18413] ? mas_walk+0x422/0x7c0 [ 1058.756297][T18413] ? lock_mm_and_find_vma+0x760/0x760 [ 1058.757239][T18402] gre292: entered promiscuous mode [ 1058.761685][T18413] handle_mm_fault+0x2ab/0x9d0 [ 1058.761727][T18413] ? access_error+0x156/0x2d0 [ 1058.761750][T18413] do_user_addr_fault+0x2e7/0xfc0 [ 1058.761771][T18413] ? rcu_is_watching+0x12/0xb0 [ 1058.761799][T18413] exc_page_fault+0x5c/0xd0 [ 1058.761822][T18413] asm_exc_page_fault+0x26/0x30 [ 1058.761840][T18413] RIP: 0033:0x7ffba08286e6 [ 1058.761861][T18413] Code: f0 72 6e 48 63 cd 48 01 c1 49 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 <47> 0f b6 0c 08 45 84 c9 74 08 45 88 0c 00 49 8b 47 10 48 83 c0 01 [ 1058.761877][T18413] RSP: 002b:00007ffba159a520 EFLAGS: 00010206 [ 1058.761891][T18413] RAX: 0000000000001001 RBX: 00007ffba159a5c0 RCX: 0000000000000091 [ 1058.761902][T18413] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00007ffba159a660 20:09:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x3, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1058.761912][T18413] RBP: 0000000000000102 R08: 00007ffb96fff000 R09: 0000000000001000 [ 1058.761922][T18413] R10: 0000000000000000 R11: 00007ffba159a5d0 R12: 0000000000000001 [ 1058.761931][T18413] R13: 00007ffba08ea360 R14: 0000000000000000 R15: 00007ffba159a660 [ 1058.761950][T18413] [ 1058.769391][T18413] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 1058.806620][T18402] team359: Port device gre292 added [ 1058.831436][T18413] loop0: detected capacity change from 0 to 24 [ 1058.896040][T18413] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1058.903713][T18413] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1059.025536][T18407] gre300: entered promiscuous mode [ 1059.034577][T18407] team368: Port device gre300 added [ 1059.046392][T18408] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1059.075517][T18408] team373: entered promiscuous mode [ 1059.081138][T18408] 8021q: adding VLAN 0 to HW filter on device team373 [ 1059.157524][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1059.175898][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1059.182759][T18409] gre304: entered promiscuous mode [ 1059.186882][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1059.193278][T18409] team373: Port device gre304 added [ 1059.209051][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1059.237791][T12655] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1059.267589][T12655] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1059.276729][T12655] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1059.317532][T12655] usb 5-1: config 0 descriptor?? [ 1059.778482][T12655] keytouch 0003:0926:3333.0068: fixing up Keytouch IEC report descriptor [ 1059.788026][T12655] keytouch 0003:0926:3333.0068: usb_submit_urb(out) failed: -90 [ 1059.796615][T12655] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.0068/input/input115 [ 1059.888332][T12655] keytouch 0003:0926:3333.0068: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 20:09:50 executing program 4: r0 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}, {&(0x7f0000000140)="cdc859201133ddf74bfce05b7f52d225bc03", 0x12}], 0x2}, 0x0) ioctl$EXT4_IOC_SETFSUUID(r0, 0x4008662c, &(0x7f0000000040)={0x10, 0x0, "c4461867d9db38399894722cca9f074a"}) r1 = syz_usb_connect$hid(0x4, 0x3f, &(0x7f0000000080)=ANY=[@ANYRES64=r0], 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:09:50 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 18) 20:09:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x6, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:09:50 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x65580000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:50 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x76030000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:50 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xcc030000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1060.342373][T18420] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1060.351059][T18420] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1060.363053][ T5120] usb 5-1: USB disconnect, device number 22 [ 1060.397795][T18430] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1060.410914][T18431] FAULT_INJECTION: forcing a failure. [ 1060.410914][T18431] name failslab, interval 1, probability 0, space 0, times 0 [ 1060.425529][T18431] CPU: 0 PID: 18431 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1060.435973][T18431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1060.446053][T18431] Call Trace: [ 1060.449343][T18431] [ 1060.452274][T18431] dump_stack_lvl+0x125/0x1b0 [ 1060.456972][T18431] should_fail_ex+0x496/0x5b0 [ 1060.461762][T18431] should_failslab+0x9/0x20 [ 1060.466276][T18431] kmem_cache_alloc+0x33a/0x3b0 [ 1060.471141][T18431] ptlock_alloc+0x1f/0x70 [ 1060.475769][T18431] pte_alloc_one+0x6a/0x240 [ 1060.480281][T18431] __pte_alloc+0x6e/0x270 [ 1060.484652][T18431] ? pmd_install+0x170/0x170 [ 1060.489269][T18431] ? find_held_lock+0x59/0x110 [ 1060.494069][T18431] __handle_mm_fault+0x3463/0x3b80 [ 1060.499406][T18431] ? vm_iomap_memory+0x170/0x170 [ 1060.504360][T18431] ? mas_walk+0x422/0x7c0 [ 1060.508729][T18431] ? lock_mm_and_find_vma+0x760/0x760 [ 1060.514112][T18431] handle_mm_fault+0x2ab/0x9d0 [ 1060.518891][T18431] ? access_error+0x156/0x2d0 [ 1060.523574][T18431] do_user_addr_fault+0x2e7/0xfc0 [ 1060.528628][T18431] ? rcu_is_watching+0x12/0xb0 [ 1060.533403][T18431] exc_page_fault+0x5c/0xd0 [ 1060.537910][T18431] asm_exc_page_fault+0x26/0x30 [ 1060.542869][T18431] RIP: 0033:0x7ffba08286e6 [ 1060.547278][T18431] Code: f0 72 6e 48 63 cd 48 01 c1 49 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 <47> 0f b6 0c 08 45 84 c9 74 08 45 88 0c 00 49 8b 47 10 48 83 c0 01 [ 1060.566921][T18431] RSP: 002b:00007ffba159a520 EFLAGS: 00010206 [ 1060.572998][T18431] RAX: 0000000000001001 RBX: 00007ffba159a5c0 RCX: 0000000000000091 [ 1060.580989][T18431] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00007ffba159a660 [ 1060.588958][T18431] RBP: 0000000000000102 R08: 00007ffb96fff000 R09: 0000000000001000 20:09:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x7, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1060.596926][T18431] R10: 0000000000000000 R11: 00007ffba159a5d0 R12: 0000000000000001 [ 1060.604898][T18431] R13: 00007ffba08ea360 R14: 0000000000000000 R15: 00007ffba159a660 [ 1060.613056][T18431] [ 1060.627034][T18430] team360: entered promiscuous mode [ 1060.629950][T18431] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF 20:09:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x8, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:09:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1060.669961][T18431] loop0: detected capacity change from 0 to 24 [ 1060.683950][T18431] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1060.694072][T18431] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1060.701944][T18430] 8021q: adding VLAN 0 to HW filter on device team360 20:09:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x2, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:09:51 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 19) [ 1060.767531][T18434] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:09:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x3, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1060.809463][T18434] team374: entered promiscuous mode [ 1060.815559][T18434] 8021q: adding VLAN 0 to HW filter on device team374 [ 1060.885700][T18451] FAULT_INJECTION: forcing a failure. [ 1060.885700][T18451] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1060.909280][T18451] CPU: 1 PID: 18451 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1060.919769][T18451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1060.929849][T18451] Call Trace: [ 1060.933142][T18451] [ 1060.936083][T18451] dump_stack_lvl+0x125/0x1b0 [ 1060.940791][T18451] should_fail_ex+0x496/0x5b0 [ 1060.945499][T18451] __should_fail_alloc_page+0xe7/0x130 [ 1060.950981][T18451] prepare_alloc_pages.constprop.0+0x16f/0x550 [ 1060.957181][T18451] __alloc_pages+0x14e/0x4a0 [ 1060.961808][T18451] ? __alloc_pages_slowpath.constprop.0+0x2360/0x2360 [ 1060.968626][T18451] ? __lock_acquire+0x182f/0x5de0 [ 1060.973675][T18451] ? find_held_lock+0x2d/0x110 [ 1060.978467][T18451] __folio_alloc+0x16/0x40 [ 1060.982997][T18451] vma_alloc_folio+0x156/0x890 [ 1060.987801][T18451] ? policy_nodemask+0x1d0/0x1d0 [ 1060.992760][T18451] do_wp_page+0x159a/0x3710 [ 1060.997288][T18451] ? lock_sync+0x190/0x190 [ 1061.001174][T18435] gre293: entered promiscuous mode [ 1061.001706][T18451] ? finish_mkwrite_fault+0x250/0x250 [ 1061.001758][T18451] ? spin_bug+0x1d0/0x1d0 [ 1061.001797][T18451] __handle_mm_fault+0x1af7/0x3b80 [ 1061.001825][T18451] ? vm_iomap_memory+0x170/0x170 [ 1061.001848][T18451] ? mas_walk+0x422/0x7c0 [ 1061.001878][T18451] ? lock_mm_and_find_vma+0x760/0x760 [ 1061.001899][T18451] ? do_user_addr_fault+0x384/0xfc0 [ 1061.001920][T18451] handle_mm_fault+0x2ab/0x9d0 [ 1061.020530][T18435] team360: Port device gre293 added [ 1061.022644][T18451] ? access_error+0x156/0x2d0 [ 1061.022678][T18451] do_user_addr_fault+0x2e7/0xfc0 [ 1061.022702][T18451] ? rcu_is_watching+0x12/0xb0 [ 1061.028419][T18436] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1061.031955][T18451] exc_page_fault+0x5c/0xd0 [ 1061.031995][T18451] asm_exc_page_fault+0x26/0x30 [ 1061.032017][T18451] RIP: 0033:0x7ffba0828643 [ 1061.032034][T18451] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 1061.109637][T18451] RSP: 002b:00007ffba159a520 EFLAGS: 00010202 [ 1061.115736][T18451] RAX: 00000000000024e2 RBX: 00007ffba159a5c0 RCX: 00007ffb96fff000 [ 1061.123738][T18451] RDX: 00007ffba159a760 RSI: 0000000000000001 RDI: 00007ffba159a660 [ 1061.131807][T18451] RBP: 0000000000000027 R08: 0000000000000006 R09: 00000000fffffffe [ 1061.140145][T18451] R10: 0000000000000014 R11: 00007ffba159a5c0 R12: 0000000000000001 [ 1061.148148][T18451] R13: 00007ffba08ea360 R14: 0000000000000026 R15: 00007ffba159a660 [ 1061.156136][T18451] [ 1061.169700][T18436] team369: entered promiscuous mode [ 1061.183925][T18436] 8021q: adding VLAN 0 to HW filter on device team369 20:09:51 executing program 4: r0 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}, {&(0x7f0000000140)="cdc859201133ddf74bfce05b7f52d225bc03", 0x12}], 0x2}, 0x0) ioctl$EXT4_IOC_SETFSUUID(r0, 0x4008662c, &(0x7f0000000040)={0x10, 0x0, "c4461867d9db38399894722cca9f074a"}) (async) r1 = syz_usb_connect$hid(0x4, 0x3f, &(0x7f0000000080)=ANY=[@ANYRES64=r0], 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:09:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:09:51 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x65660400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1061.237456][T18451] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 1061.247196][T18451] loop0: detected capacity change from 0 to 24 [ 1061.255414][T18451] MTD: Attempt to mount non-MTD device "/dev/loop0" 20:09:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x2, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1061.284173][T18451] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1061.451267][T18441] gre305: entered promiscuous mode [ 1061.459266][T18441] team374: Port device gre305 added 20:09:52 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x78000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:52 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 20) 20:09:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x3, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:09:52 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xcc720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1061.606325][T18442] gre301: entered promiscuous mode [ 1061.615460][T18442] team369: Port device gre301 added 20:09:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x4, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1061.684985][T18472] FAULT_INJECTION: forcing a failure. [ 1061.684985][T18472] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1061.709925][T18472] CPU: 1 PID: 18472 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1061.720515][T18472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1061.730598][T18472] Call Trace: [ 1061.733884][T18472] [ 1061.736821][T18472] dump_stack_lvl+0x125/0x1b0 [ 1061.741530][T18472] should_fail_ex+0x496/0x5b0 [ 1061.746246][T18472] __should_fail_alloc_page+0xe7/0x130 [ 1061.751732][T18472] prepare_alloc_pages.constprop.0+0x16f/0x550 [ 1061.757930][T18472] __alloc_pages+0x14e/0x4a0 [ 1061.762555][T18472] ? mark_lock+0x105/0x1950 [ 1061.767086][T18472] ? __alloc_pages_slowpath.constprop.0+0x2360/0x2360 [ 1061.773964][T18472] __folio_alloc+0x16/0x40 [ 1061.778446][T18472] vma_alloc_folio+0x156/0x890 [ 1061.783245][T18472] ? policy_nodemask+0x1d0/0x1d0 [ 1061.788229][T18472] ? print_usage_bug.part.0+0x670/0x670 [ 1061.793814][T18472] ? mpol_shared_policy_lookup+0xf2/0x140 [ 1061.799580][T18472] shmem_alloc_folio+0xb5/0x170 [ 1061.804457][T18472] ? find_held_lock+0x2d/0x110 [ 1061.809249][T18472] ? zero_user_segments.constprop.0+0x360/0x360 [ 1061.815571][T18472] ? percpu_counter_add_batch+0x132/0x1f0 [ 1061.821351][T18472] shmem_alloc_and_acct_folio+0x168/0x5e0 [ 1061.827116][T18472] shmem_get_folio_gfp+0xce7/0x1b60 [ 1061.832351][T18472] ? shmem_is_huge+0x2f0/0x2f0 [ 1061.837144][T18472] ? current_time+0x88/0x2c0 [ 1061.841771][T18472] ? reacquire_held_locks+0x4b0/0x4b0 [ 1061.847165][T18472] shmem_write_begin+0x15c/0x390 [ 1061.852125][T18472] ? fault_in_subpage_writeable+0x20/0x20 [ 1061.857873][T18472] ? shmem_file_splice_read+0xd10/0xd10 [ 1061.863440][T18472] generic_perform_write+0x278/0x600 [ 1061.868754][T18472] ? folio_add_wait_queue+0x1c0/0x1c0 [ 1061.874167][T18472] ? new_inode+0x260/0x260 [ 1061.878614][T18472] ? generic_write_checks_count+0x2d0/0x2d0 [ 1061.884528][T18472] __generic_file_write_iter+0x1f9/0x240 [ 1061.890211][T18472] generic_file_write_iter+0xe3/0x350 [ 1061.895616][T18472] vfs_write+0x650/0xe40 [ 1061.899864][T18472] ? kernel_write+0x6c0/0x6c0 [ 1061.904552][T18472] ? __fget_files+0x279/0x410 [ 1061.909244][T18472] ? __fget_light+0xe6/0x260 [ 1061.913845][T18472] ksys_write+0x12f/0x250 [ 1061.918190][T18472] ? __ia32_sys_read+0xb0/0xb0 [ 1061.922998][T18472] ? syscall_enter_from_user_mode+0x26/0x80 [ 1061.928922][T18472] do_syscall_64+0x38/0xb0 [ 1061.933367][T18472] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1061.939269][T18472] RIP: 0033:0x7ffba087b82f [ 1061.943693][T18472] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 1061.963452][T18472] RSP: 002b:00007ffba159ae70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1061.971890][T18472] RAX: ffffffffffffffda RBX: 0000000000003000 RCX: 00007ffba087b82f 20:09:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x5, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:09:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x6, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:09:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x7, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:09:52 executing program 4: r0 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}, {&(0x7f0000000140)="cdc859201133ddf74bfce05b7f52d225bc03", 0x12}], 0x2}, 0x0) ioctl$EXT4_IOC_SETFSUUID(r0, 0x4008662c, &(0x7f0000000040)={0x10, 0x0, "c4461867d9db38399894722cca9f074a"}) (async) r1 = syz_usb_connect$hid(0x4, 0x3f, &(0x7f0000000080)=ANY=[@ANYRES64=r0], 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) (async) syz_usb_control_io(r1, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:09:52 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 21) [ 1061.976260][T18460] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1061.979858][T18472] RDX: 0000000000003000 RSI: 00007ffb96fff000 RDI: 0000000000000004 [ 1061.979876][T18472] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1061.979888][T18472] R10: 0000000020004402 R11: 0000000000000293 R12: 0000000000000004 [ 1061.979900][T18472] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1061.979924][T18472] [ 1062.093872][T18492] FAULT_INJECTION: forcing a failure. [ 1062.093872][T18492] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1062.096866][T18460] team361: entered promiscuous mode [ 1062.107624][T18492] CPU: 1 PID: 18492 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1062.113302][T18460] 8021q: adding VLAN 0 to HW filter on device team361 [ 1062.123018][T18492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1062.123038][T18492] Call Trace: [ 1062.123045][T18492] [ 1062.123053][T18492] dump_stack_lvl+0x125/0x1b0 [ 1062.123086][T18492] should_fail_ex+0x496/0x5b0 [ 1062.123120][T18492] copyin+0x1b/0xa0 [ 1062.123150][T18492] copy_page_from_iter_atomic+0x257/0x13e0 [ 1062.123187][T18492] ? current_time+0x88/0x2c0 [ 1062.169770][T18492] ? reacquire_held_locks+0x4b0/0x4b0 [ 1062.175184][T18492] ? folio_flags.constprop.0+0x56/0x150 [ 1062.180768][T18492] ? csum_and_copy_to_iter+0x1430/0x1430 [ 1062.186435][T18492] ? shmem_write_begin+0x172/0x390 [ 1062.191590][T18492] ? fault_in_subpage_writeable+0x20/0x20 [ 1062.197349][T18492] ? shmem_file_splice_read+0xd10/0xd10 [ 1062.202938][T18492] generic_perform_write+0x2e8/0x600 [ 1062.208260][T18492] ? folio_add_wait_queue+0x1c0/0x1c0 [ 1062.213660][T18492] ? new_inode+0x260/0x260 [ 1062.218101][T18492] ? generic_write_checks_count+0x2d0/0x2d0 [ 1062.224272][T18492] __generic_file_write_iter+0x1f9/0x240 [ 1062.229923][T18492] generic_file_write_iter+0xe3/0x350 [ 1062.235316][T18492] vfs_write+0x650/0xe40 [ 1062.239576][T18492] ? kernel_write+0x6c0/0x6c0 [ 1062.244268][T18492] ? __fget_files+0x279/0x410 [ 1062.249024][T18492] ? __fget_light+0xe6/0x260 [ 1062.253652][T18492] ksys_write+0x12f/0x250 [ 1062.258007][T18492] ? __ia32_sys_read+0xb0/0xb0 [ 1062.262810][T18492] ? syscall_enter_from_user_mode+0x26/0x80 [ 1062.268746][T18492] do_syscall_64+0x38/0xb0 [ 1062.273193][T18492] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1062.279109][T18492] RIP: 0033:0x7ffba087b82f [ 1062.283530][T18492] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 1062.290092][T18465] gre294: entered promiscuous mode [ 1062.303145][T18492] RSP: 002b:00007ffba159ae70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1062.303173][T18492] RAX: ffffffffffffffda RBX: 0000000000003000 RCX: 00007ffba087b82f [ 1062.303185][T18492] RDX: 0000000000003000 RSI: 00007ffb96fff000 RDI: 0000000000000004 [ 1062.303198][T18492] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1062.303212][T18492] R10: 0000000020004402 R11: 0000000000000293 R12: 0000000000000004 [ 1062.303225][T18492] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1062.303249][T18492] [ 1062.330285][T18492] loop0: detected capacity change from 0 to 24 [ 1062.348077][T18465] team361: Port device gre294 added [ 1062.359142][T18492] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1062.364305][T18474] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:09:52 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x68000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x8, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1062.373503][T18492] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1062.406251][T18474] team375: entered promiscuous mode [ 1062.419025][T18474] 8021q: adding VLAN 0 to HW filter on device team375 [ 1062.457007][T18477] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:09:52 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 22) 20:09:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0xa, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:09:52 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x7a000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:52 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xcd720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1062.510960][T18477] team370: entered promiscuous mode [ 1062.516422][T18477] 8021q: adding VLAN 0 to HW filter on device team370 20:09:52 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000600)={0x24, &(0x7f0000000480)={0x0, 0x2, 0x83, {0x83, 0x5, "bed90e1f79ba1df22deab2b92832e92ef1891b4bc8241bc9b7718483489556cc9f522bc80087468d6d31f27def9513d8bef704f7bcd96335024d30b46c3eccf1367c1de857f583f7827f31397867a2f838c9d5ba1d66afa3db1438f10d73eb48411a4029eba4d6a0b37b1804202373f9ee14badbdf3dfaa8d855bae1a4466af18f"}}, &(0x7f0000000540)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x419}}, &(0x7f0000000580)={0x0, 0x22, 0xa, {[@main=@item_012={0x0, 0x0, 0xb}, @global=@item_4={0x3, 0x1, 0x6, "4e7fb1b2"}, @local, @main=@item_012={0x2, 0x0, 0x9, "c797"}]}}, &(0x7f00000005c0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x6d, 0x8, 0x1, {0x22, 0x58}}}}, &(0x7f0000000840)={0x2c, &(0x7f0000000640)={0x40, 0x30, 0x40, "ad21382536c5804d2a591fca30074619e13a0c79a4b69a0138cc21a7f3fcc7e9106e1498bcaa22e675337ab82d922f89a9c789cbb4af6c56372751b2a9cb9ca8"}, &(0x7f00000006c0)={0x0, 0xa, 0x1, 0x8}, &(0x7f0000000700)={0x0, 0x8, 0x1, 0x79}, &(0x7f0000000740)={0x20, 0x1, 0xb2, "724fc5b4a91ba91b60e6a6713623626043bb54c9fc4c6f633ef9a469755f345d5d9e78441201b83057596705d29e15b947aa5a0cf2ca45e276604bbbcd7df2daebfc87a91c7e1adda713f2680ec49ff2e34de1ee2fa8751ba7dc98f7fe8e9fa663a60b471c57b55379f42f55756bb3328098239dc578b404f3e4f21a60bceb9513726e10f38e0aa80f9f4236f8c525f7274672a699957059744ecd5b5bac260f7d6477da121ac0b1dc061f46e9c5267d462c"}, &(0x7f0000000800)={0x20, 0x3, 0x1, 0x1}}) syz_usb_control_io$printer(0xffffffffffffffff, &(0x7f0000000180)={0x14, &(0x7f00000000c0)={0x40, 0x9, 0x92, {0x92, 0x21, "f2fc6eb6f644f0d36ea14fb40ead441c6013cea54c5482e73941ad4845072e16aa1a4e7de255d628a49e85c295b68198debf8289ef470a8383413a0bc707f1769b0e7ee3c17c72a9b723e467bc37e0ffab63eaf66c323e399d44a41317b0bb419bbac06c014b8166c1cb92c66bb52b39a85d6df239baea43bdf8fc5cc3e4bdec916eb662ed494b8c57742ed6511251a1"}}, &(0x7f0000000040)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1404}}}, &(0x7f0000000440)={0x34, &(0x7f0000000280)={0x20, 0x31, 0xcf, "52a87422eeed8e0c94a4692901fcc428d6d1c7b2eb85ca21849fa7734d562854fb550b3651665f48c7102d3d249bd4c1ebf4e11a81551550e1b233b1efff186a3accffb9760151b3a9a232a0c444049e7af4617ff3de6b2cac7491516b3d19baaaa19e7573d0254940f10cf8a39c022c5f14bc6411c9e775f611b542e52e19c9cd227a6ce8781472bf603c43a7563fd7befa1a4e0a4ee1de2cb09cdfce66c363be73ee502501bb1e89ab7567d961c2c77a3af188211c1a84ea7d7c2e39abd57abaff02ce5d629d658f7980bfe219e1"}, &(0x7f00000001c0)={0x0, 0xa, 0x1}, &(0x7f0000000200)={0x0, 0x8, 0x1}, &(0x7f0000000380)={0x20, 0x0, 0x15, {0x13, "7cc0a304478b81f1ffc1c5f12d4751771825d2"}}, &(0x7f00000003c0)={0x20, 0x1, 0x1, 0x20}, &(0x7f0000000400)={0x20, 0x0, 0x1}}) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:09:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0xe, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1062.623085][T18505] FAULT_INJECTION: forcing a failure. [ 1062.623085][T18505] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1062.636544][T18505] CPU: 1 PID: 18505 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1062.646975][T18505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1062.657031][T18505] Call Trace: [ 1062.660309][T18505] [ 1062.663237][T18505] dump_stack_lvl+0x125/0x1b0 [ 1062.667927][T18505] should_fail_ex+0x496/0x5b0 20:09:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x11, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1062.672635][T18505] copyin+0x1b/0xa0 [ 1062.676470][T18505] copy_page_from_iter_atomic+0x257/0x13e0 [ 1062.682340][T18505] ? current_time+0x88/0x2c0 [ 1062.686975][T18505] ? reacquire_held_locks+0x4b0/0x4b0 [ 1062.691472][T18497] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1062.692362][T18505] ? folio_flags.constprop.0+0x56/0x150 [ 1062.707238][T18505] ? csum_and_copy_to_iter+0x1430/0x1430 [ 1062.713440][T18505] ? shmem_write_begin+0x172/0x390 [ 1062.718695][T18505] ? fault_in_subpage_writeable+0x20/0x20 [ 1062.724527][T18505] ? shmem_file_splice_read+0xd10/0xd10 [ 1062.730119][T18505] generic_perform_write+0x2e8/0x600 [ 1062.730408][T18497] team362: entered promiscuous mode [ 1062.735457][T18505] ? folio_add_wait_queue+0x1c0/0x1c0 [ 1062.735497][T18505] ? new_inode+0x260/0x260 [ 1062.735521][T18505] ? generic_write_checks_count+0x2d0/0x2d0 [ 1062.735545][T18505] __generic_file_write_iter+0x1f9/0x240 [ 1062.747600][T18497] 8021q: adding VLAN 0 to HW filter on device team362 [ 1062.750511][T18505] generic_file_write_iter+0xe3/0x350 [ 1062.750545][T18505] vfs_write+0x650/0xe40 [ 1062.750575][T18505] ? kernel_write+0x6c0/0x6c0 [ 1062.750606][T18505] ? __fget_files+0x279/0x410 [ 1062.787974][T18505] ? __fget_light+0xe6/0x260 [ 1062.792604][T18505] ksys_write+0x12f/0x250 [ 1062.797586][T18505] ? __ia32_sys_read+0xb0/0xb0 [ 1062.802571][T18505] ? syscall_enter_from_user_mode+0x26/0x80 [ 1062.808518][T18505] do_syscall_64+0x38/0xb0 [ 1062.812964][T18505] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1062.818917][T18505] RIP: 0033:0x7ffba087b82f [ 1062.823360][T18505] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 1062.843008][T18505] RSP: 002b:00007ffba159ae70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1062.851469][T18505] RAX: ffffffffffffffda RBX: 0000000000003000 RCX: 00007ffba087b82f [ 1062.859458][T18505] RDX: 0000000000003000 RSI: 00007ffb96fff000 RDI: 0000000000000004 20:09:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x14, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1062.867466][T18505] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1062.875550][T18505] R10: 0000000020004402 R11: 0000000000000293 R12: 0000000000000004 [ 1062.883542][T18505] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1062.891551][T18505] 20:09:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x28, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:09:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x36, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1062.938406][T18505] loop0: detected capacity change from 0 to 24 [ 1062.945347][T18505] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1062.960757][T18505] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1062.969786][ T5120] usb 5-1: new high-speed USB device number 23 using dummy_hcd 20:09:53 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x6a010000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1063.043605][T18501] gre295: entered promiscuous mode [ 1063.058545][T18501] team362: Port device gre295 added [ 1063.065845][T18514] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1063.095827][T18515] team371: entered promiscuous mode [ 1063.105671][T18515] 8021q: adding VLAN 0 to HW filter on device team371 20:09:53 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 23) 20:09:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1063.213128][T18533] loop0: detected capacity change from 0 to 24 [ 1063.234548][T18533] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1063.262327][T18533] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1063.308925][T18510] gre302: entered promiscuous mode [ 1063.316172][T18510] team371: Port device gre302 added 20:09:53 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x7a110000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:53 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xce720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1063.377765][ T5120] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1063.401651][ T5120] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1063.424000][ T5120] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1063.440274][ T5120] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1063.452006][ T5120] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1063.469182][ T5120] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1063.476448][T18531] team363: entered promiscuous mode [ 1063.483652][ T5120] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1063.485504][T18531] 8021q: adding VLAN 0 to HW filter on device team363 [ 1063.506877][ T5120] usb 5-1: config 0 descriptor?? [ 1063.573758][T18534] gre296: entered promiscuous mode [ 1063.583526][T18534] team363: Port device gre296 added [ 1063.589577][T18539] __nla_validate_parse: 2 callbacks suppressed [ 1063.589593][T18539] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1063.624038][T18539] team376: entered promiscuous mode [ 1063.630906][T18539] 8021q: adding VLAN 0 to HW filter on device team376 [ 1063.646040][T18540] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1063.665941][T18540] team372: entered promiscuous mode [ 1063.671721][T18540] 8021q: adding VLAN 0 to HW filter on device team372 [ 1063.759736][T18541] gre306: entered promiscuous mode [ 1063.769146][T18541] team376: Port device gre306 added [ 1063.857793][T18542] gre303: entered promiscuous mode [ 1063.865077][T18542] team372: Port device gre303 added [ 1063.968569][ T5120] keytouch 0003:0926:3333.0069: fixing up Keytouch IEC report descriptor [ 1063.985257][ T5120] keytouch 0003:0926:3333.0069: usb_submit_urb(out) failed: -90 [ 1063.998101][ T5120] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.0069/input/input116 [ 1064.088510][ T5120] keytouch 0003:0926:3333.0069: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 1065.257375][ T5120] usb 5-1: reset high-speed USB device number 23 using dummy_hcd [ 1065.457764][ T5120] usb 5-1: device descriptor read/64, error 1 20:09:56 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000600)={0x24, &(0x7f0000000480)={0x0, 0x2, 0x83, {0x83, 0x5, "bed90e1f79ba1df22deab2b92832e92ef1891b4bc8241bc9b7718483489556cc9f522bc80087468d6d31f27def9513d8bef704f7bcd96335024d30b46c3eccf1367c1de857f583f7827f31397867a2f838c9d5ba1d66afa3db1438f10d73eb48411a4029eba4d6a0b37b1804202373f9ee14badbdf3dfaa8d855bae1a4466af18f"}}, &(0x7f0000000540)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x419}}, &(0x7f0000000580)={0x0, 0x22, 0xa, {[@main=@item_012={0x0, 0x0, 0xb}, @global=@item_4={0x3, 0x1, 0x6, "4e7fb1b2"}, @local, @main=@item_012={0x2, 0x0, 0x9, "c797"}]}}, &(0x7f00000005c0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x6d, 0x8, 0x1, {0x22, 0x58}}}}, &(0x7f0000000840)={0x2c, &(0x7f0000000640)={0x40, 0x30, 0x40, "ad21382536c5804d2a591fca30074619e13a0c79a4b69a0138cc21a7f3fcc7e9106e1498bcaa22e675337ab82d922f89a9c789cbb4af6c56372751b2a9cb9ca8"}, &(0x7f00000006c0)={0x0, 0xa, 0x1, 0x8}, &(0x7f0000000700)={0x0, 0x8, 0x1, 0x79}, &(0x7f0000000740)={0x20, 0x1, 0xb2, "724fc5b4a91ba91b60e6a6713623626043bb54c9fc4c6f633ef9a469755f345d5d9e78441201b83057596705d29e15b947aa5a0cf2ca45e276604bbbcd7df2daebfc87a91c7e1adda713f2680ec49ff2e34de1ee2fa8751ba7dc98f7fe8e9fa663a60b471c57b55379f42f55756bb3328098239dc578b404f3e4f21a60bceb9513726e10f38e0aa80f9f4236f8c525f7274672a699957059744ecd5b5bac260f7d6477da121ac0b1dc061f46e9c5267d462c"}, &(0x7f0000000800)={0x20, 0x3, 0x1, 0x1}}) (async) syz_usb_control_io$printer(0xffffffffffffffff, &(0x7f0000000180)={0x14, &(0x7f00000000c0)={0x40, 0x9, 0x92, {0x92, 0x21, "f2fc6eb6f644f0d36ea14fb40ead441c6013cea54c5482e73941ad4845072e16aa1a4e7de255d628a49e85c295b68198debf8289ef470a8383413a0bc707f1769b0e7ee3c17c72a9b723e467bc37e0ffab63eaf66c323e399d44a41317b0bb419bbac06c014b8166c1cb92c66bb52b39a85d6df239baea43bdf8fc5cc3e4bdec916eb662ed494b8c57742ed6511251a1"}}, &(0x7f0000000040)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1404}}}, &(0x7f0000000440)={0x34, &(0x7f0000000280)={0x20, 0x31, 0xcf, "52a87422eeed8e0c94a4692901fcc428d6d1c7b2eb85ca21849fa7734d562854fb550b3651665f48c7102d3d249bd4c1ebf4e11a81551550e1b233b1efff186a3accffb9760151b3a9a232a0c444049e7af4617ff3de6b2cac7491516b3d19baaaa19e7573d0254940f10cf8a39c022c5f14bc6411c9e775f611b542e52e19c9cd227a6ce8781472bf603c43a7563fd7befa1a4e0a4ee1de2cb09cdfce66c363be73ee502501bb1e89ab7567d961c2c77a3af188211c1a84ea7d7c2e39abd57abaff02ce5d629d658f7980bfe219e1"}, &(0x7f00000001c0)={0x0, 0xa, 0x1}, &(0x7f0000000200)={0x0, 0x8, 0x1}, &(0x7f0000000380)={0x20, 0x0, 0x15, {0x13, "7cc0a304478b81f1ffc1c5f12d4751771825d2"}}, &(0x7f00000003c0)={0x20, 0x1, 0x1, 0x20}, &(0x7f0000000400)={0x20, 0x0, 0x1}}) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:09:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x4528, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:09:56 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 24) 20:09:56 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x6c000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:56 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xcf720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:56 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x81000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1066.019617][T18546] FAULT_INJECTION: forcing a failure. [ 1066.019617][T18546] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1066.032967][T18546] CPU: 1 PID: 18546 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1066.039656][T18550] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1066.043398][T18546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1066.043413][T18546] Call Trace: [ 1066.043419][T18546] [ 1066.043427][T18546] dump_stack_lvl+0x125/0x1b0 [ 1066.043456][T18546] should_fail_ex+0x496/0x5b0 [ 1066.078345][T18546] copyin+0x1b/0xa0 [ 1066.082193][T18546] copy_page_from_iter_atomic+0x257/0x13e0 [ 1066.082375][T18550] team377: entered promiscuous mode [ 1066.088013][T18546] ? current_time+0x88/0x2c0 [ 1066.088040][T18546] ? reacquire_held_locks+0x4b0/0x4b0 [ 1066.088067][T18546] ? folio_flags.constprop.0+0x56/0x150 [ 1066.088096][T18546] ? csum_and_copy_to_iter+0x1430/0x1430 [ 1066.088126][T18546] ? shmem_write_begin+0x172/0x390 [ 1066.088148][T18546] ? fault_in_subpage_writeable+0x20/0x20 [ 1066.088170][T18546] ? shmem_file_splice_read+0xd10/0xd10 [ 1066.088197][T18546] generic_perform_write+0x2e8/0x600 [ 1066.088235][T18546] ? folio_add_wait_queue+0x1c0/0x1c0 [ 1066.088263][T18546] ? new_inode+0x260/0x260 [ 1066.088286][T18546] ? generic_write_checks_count+0x2d0/0x2d0 [ 1066.088309][T18546] __generic_file_write_iter+0x1f9/0x240 [ 1066.088333][T18546] generic_file_write_iter+0xe3/0x350 [ 1066.088357][T18546] vfs_write+0x650/0xe40 [ 1066.088394][T18546] ? kernel_write+0x6c0/0x6c0 [ 1066.171841][T18546] ? __fget_files+0x279/0x410 [ 1066.176538][T18546] ? __fget_light+0xe6/0x260 [ 1066.181138][T18546] ksys_write+0x12f/0x250 [ 1066.185470][T18546] ? __ia32_sys_read+0xb0/0xb0 [ 1066.190236][T18546] ? syscall_enter_from_user_mode+0x26/0x80 [ 1066.196138][T18546] do_syscall_64+0x38/0xb0 [ 1066.200555][T18546] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1066.206446][T18546] RIP: 0033:0x7ffba087b82f [ 1066.210854][T18546] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 1066.230643][T18546] RSP: 002b:00007ffba159ae70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1066.239237][T18546] RAX: ffffffffffffffda RBX: 0000000000003000 RCX: 00007ffba087b82f [ 1066.247205][T18546] RDX: 0000000000003000 RSI: 00007ffb96fff000 RDI: 0000000000000004 [ 1066.255176][T18546] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a 20:09:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1066.263149][T18546] R10: 0000000020004402 R11: 0000000000000293 R12: 0000000000000004 [ 1066.271119][T18546] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1066.279103][T18546] [ 1066.295222][T18550] 8021q: adding VLAN 0 to HW filter on device team377 [ 1066.301710][T18546] loop0: detected capacity change from 0 to 24 20:09:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x2, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1066.332135][T18549] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1066.333549][T18546] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1066.354432][T18546] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1066.376145][T18549] team373: entered promiscuous mode 20:09:56 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 25) 20:09:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x3, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1066.397108][T18549] 8021q: adding VLAN 0 to HW filter on device team373 20:09:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x4, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1066.471696][T18566] FAULT_INJECTION: forcing a failure. [ 1066.471696][T18566] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1066.491340][T18566] CPU: 1 PID: 18566 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1066.501825][T18566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1066.512079][T18566] Call Trace: [ 1066.515372][T18566] [ 1066.518302][T18566] dump_stack_lvl+0x125/0x1b0 [ 1066.522992][T18566] should_fail_ex+0x496/0x5b0 [ 1066.527784][T18566] __should_fail_alloc_page+0xe7/0x130 [ 1066.533292][T18566] prepare_alloc_pages.constprop.0+0x16f/0x550 [ 1066.539736][T18566] __alloc_pages+0x14e/0x4a0 [ 1066.544334][T18566] ? __alloc_pages_slowpath.constprop.0+0x2360/0x2360 [ 1066.551109][T18566] __folio_alloc+0x16/0x40 [ 1066.555525][T18566] vma_alloc_folio+0x156/0x890 [ 1066.560290][T18566] ? policy_nodemask+0x1d0/0x1d0 [ 1066.565227][T18566] ? print_usage_bug.part.0+0x670/0x670 [ 1066.570771][T18566] ? mpol_shared_policy_lookup+0xf2/0x140 [ 1066.576516][T18566] shmem_alloc_folio+0xb5/0x170 [ 1066.581358][T18566] ? find_held_lock+0x2d/0x110 [ 1066.586119][T18566] ? zero_user_segments.constprop.0+0x360/0x360 [ 1066.592368][T18566] ? percpu_counter_add_batch+0x132/0x1f0 [ 1066.598094][T18566] shmem_alloc_and_acct_folio+0x168/0x5e0 [ 1066.603813][T18566] shmem_get_folio_gfp+0xce7/0x1b60 [ 1066.609013][T18566] ? shmem_is_huge+0x2f0/0x2f0 [ 1066.613768][T18566] ? current_time+0x88/0x2c0 [ 1066.618350][T18566] ? reacquire_held_locks+0x4b0/0x4b0 [ 1066.623724][T18566] shmem_write_begin+0x15c/0x390 [ 1066.628655][T18566] ? fault_in_subpage_writeable+0x20/0x20 [ 1066.634368][T18566] ? shmem_file_splice_read+0xd10/0xd10 [ 1066.639910][T18566] generic_perform_write+0x278/0x600 [ 1066.645205][T18566] ? folio_add_wait_queue+0x1c0/0x1c0 [ 1066.650576][T18566] ? new_inode+0x260/0x260 [ 1066.655007][T18566] ? generic_write_checks_count+0x2d0/0x2d0 [ 1066.660905][T18566] __generic_file_write_iter+0x1f9/0x240 [ 1066.666545][T18566] generic_file_write_iter+0xe3/0x350 [ 1066.671925][T18566] vfs_write+0x650/0xe40 [ 1066.676197][T18566] ? kernel_write+0x6c0/0x6c0 [ 1066.680893][T18566] ? __fget_files+0x279/0x410 [ 1066.685579][T18566] ? __fget_light+0xe6/0x260 [ 1066.690178][T18566] ksys_write+0x12f/0x250 [ 1066.694512][T18566] ? __ia32_sys_read+0xb0/0xb0 [ 1066.699369][T18566] ? syscall_enter_from_user_mode+0x26/0x80 [ 1066.705276][T18566] do_syscall_64+0x38/0xb0 [ 1066.709697][T18566] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1066.715601][T18566] RIP: 0033:0x7ffba087b82f [ 1066.720017][T18566] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 1066.739651][T18566] RSP: 002b:00007ffba159ae70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1066.748063][T18566] RAX: ffffffffffffffda RBX: 0000000000003000 RCX: 00007ffba087b82f [ 1066.756024][T18566] RDX: 0000000000003000 RSI: 00007ffb96fff000 RDI: 0000000000000004 [ 1066.763992][T18566] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a 20:09:57 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 26) [ 1066.771964][T18566] R10: 0000000020004402 R11: 0000000000000293 R12: 0000000000000004 [ 1066.779937][T18566] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1066.788004][T18566] [ 1066.851849][T18571] FAULT_INJECTION: forcing a failure. [ 1066.851849][T18571] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1066.866892][ T5120] usb 5-1: reset high-speed USB device number 23 using dummy_hcd [ 1066.883233][T18571] CPU: 1 PID: 18571 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1066.893741][T18571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1066.903810][T18571] Call Trace: [ 1066.907094][T18571] [ 1066.910024][T18571] dump_stack_lvl+0x125/0x1b0 [ 1066.914711][T18571] should_fail_ex+0x496/0x5b0 [ 1066.919399][T18571] __should_fail_alloc_page+0xe7/0x130 [ 1066.924869][T18571] prepare_alloc_pages.constprop.0+0x16f/0x550 [ 1066.931019][T18571] __alloc_pages+0x14e/0x4a0 [ 1066.935602][T18571] ? __alloc_pages_slowpath.constprop.0+0x2360/0x2360 [ 1066.942364][T18571] __folio_alloc+0x16/0x40 [ 1066.946779][T18571] vma_alloc_folio+0x156/0x890 [ 1066.951536][T18571] ? policy_nodemask+0x1d0/0x1d0 [ 1066.956461][T18571] ? print_usage_bug.part.0+0x670/0x670 [ 1066.961998][T18571] ? mpol_shared_policy_lookup+0xf2/0x140 [ 1066.967723][T18571] shmem_alloc_folio+0xb5/0x170 [ 1066.972577][T18571] ? find_held_lock+0x2d/0x110 [ 1066.977348][T18571] ? zero_user_segments.constprop.0+0x360/0x360 [ 1066.983637][T18571] ? percpu_counter_add_batch+0x132/0x1f0 [ 1066.989484][T18571] shmem_alloc_and_acct_folio+0x168/0x5e0 [ 1066.995232][T18571] shmem_get_folio_gfp+0xce7/0x1b60 [ 1067.000467][T18571] ? shmem_is_huge+0x2f0/0x2f0 [ 1067.005330][T18571] ? current_time+0x88/0x2c0 [ 1067.009964][T18571] ? reacquire_held_locks+0x4b0/0x4b0 [ 1067.015363][T18571] shmem_write_begin+0x15c/0x390 [ 1067.020325][T18571] ? fault_in_subpage_writeable+0x20/0x20 [ 1067.026112][T18571] ? shmem_file_splice_read+0xd10/0xd10 [ 1067.031681][T18571] generic_perform_write+0x278/0x600 [ 1067.036995][T18571] ? folio_add_wait_queue+0x1c0/0x1c0 [ 1067.042392][T18571] ? new_inode+0x260/0x260 [ 1067.046825][T18571] ? generic_write_checks_count+0x2d0/0x2d0 [ 1067.051823][T18552] gre304: entered promiscuous mode [ 1067.052801][T18571] __generic_file_write_iter+0x1f9/0x240 [ 1067.052835][T18571] generic_file_write_iter+0xe3/0x350 [ 1067.052858][T18571] vfs_write+0x650/0xe40 [ 1067.052888][T18571] ? kernel_write+0x6c0/0x6c0 [ 1067.052916][T18571] ? __fget_files+0x279/0x410 [ 1067.052941][T18571] ? __fget_light+0xe6/0x260 [ 1067.052964][T18571] ksys_write+0x12f/0x250 [ 1067.052986][T18571] ? __ia32_sys_read+0xb0/0xb0 [ 1067.053010][T18571] ? syscall_enter_from_user_mode+0x26/0x80 [ 1067.053036][T18571] do_syscall_64+0x38/0xb0 [ 1067.053053][T18571] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1067.083161][T18552] team373: Port device gre304 added [ 1067.083705][T18571] RIP: 0033:0x7ffba087b82f [ 1067.083728][T18571] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 b9 80 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 0c 81 02 00 48 [ 1067.083748][T18571] RSP: 002b:00007ffba159ae70 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1067.151699][T18571] RAX: ffffffffffffffda RBX: 0000000000003000 RCX: 00007ffba087b82f [ 1067.159694][T18571] RDX: 0000000000003000 RSI: 00007ffb96fff000 RDI: 0000000000000004 [ 1067.167720][T18571] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1067.175737][T18571] R10: 0000000020004402 R11: 0000000000000293 R12: 0000000000000004 [ 1067.183732][T18571] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1067.191759][T18571] [ 1067.260966][T18555] gre307: entered promiscuous mode [ 1067.268941][T18555] team377: Port device gre307 added [ 1067.274693][T18560] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1067.296419][T18560] team364: entered promiscuous mode [ 1067.302072][T18560] 8021q: adding VLAN 0 to HW filter on device team364 [ 1067.393205][T18561] gre297: entered promiscuous mode [ 1067.400866][T18561] team364: Port device gre297 added [ 1067.527527][ T5120] keytouch 0003:0926:3333.0069: usb_submit_urb(out) failed: -90 [ 1067.729960][ T5117] usb 5-1: USB disconnect, device number 23 20:09:58 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io$hid(r0, &(0x7f0000000600)={0x24, &(0x7f0000000480)={0x0, 0x2, 0x83, {0x83, 0x5, "bed90e1f79ba1df22deab2b92832e92ef1891b4bc8241bc9b7718483489556cc9f522bc80087468d6d31f27def9513d8bef704f7bcd96335024d30b46c3eccf1367c1de857f583f7827f31397867a2f838c9d5ba1d66afa3db1438f10d73eb48411a4029eba4d6a0b37b1804202373f9ee14badbdf3dfaa8d855bae1a4466af18f"}}, &(0x7f0000000540)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x419}}, &(0x7f0000000580)={0x0, 0x22, 0xa, {[@main=@item_012={0x0, 0x0, 0xb}, @global=@item_4={0x3, 0x1, 0x6, "4e7fb1b2"}, @local, @main=@item_012={0x2, 0x0, 0x9, "c797"}]}}, &(0x7f00000005c0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x6d, 0x8, 0x1, {0x22, 0x58}}}}, &(0x7f0000000840)={0x2c, &(0x7f0000000640)={0x40, 0x30, 0x40, "ad21382536c5804d2a591fca30074619e13a0c79a4b69a0138cc21a7f3fcc7e9106e1498bcaa22e675337ab82d922f89a9c789cbb4af6c56372751b2a9cb9ca8"}, &(0x7f00000006c0)={0x0, 0xa, 0x1, 0x8}, &(0x7f0000000700)={0x0, 0x8, 0x1, 0x79}, &(0x7f0000000740)={0x20, 0x1, 0xb2, "724fc5b4a91ba91b60e6a6713623626043bb54c9fc4c6f633ef9a469755f345d5d9e78441201b83057596705d29e15b947aa5a0cf2ca45e276604bbbcd7df2daebfc87a91c7e1adda713f2680ec49ff2e34de1ee2fa8751ba7dc98f7fe8e9fa663a60b471c57b55379f42f55756bb3328098239dc578b404f3e4f21a60bceb9513726e10f38e0aa80f9f4236f8c525f7274672a699957059744ecd5b5bac260f7d6477da121ac0b1dc061f46e9c5267d462c"}, &(0x7f0000000800)={0x20, 0x3, 0x1, 0x1}}) (async) syz_usb_control_io$printer(0xffffffffffffffff, &(0x7f0000000180)={0x14, &(0x7f00000000c0)={0x40, 0x9, 0x92, {0x92, 0x21, "f2fc6eb6f644f0d36ea14fb40ead441c6013cea54c5482e73941ad4845072e16aa1a4e7de255d628a49e85c295b68198debf8289ef470a8383413a0bc707f1769b0e7ee3c17c72a9b723e467bc37e0ffab63eaf66c323e399d44a41317b0bb419bbac06c014b8166c1cb92c66bb52b39a85d6df239baea43bdf8fc5cc3e4bdec916eb662ed494b8c57742ed6511251a1"}}, &(0x7f0000000040)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1404}}}, &(0x7f0000000440)={0x34, &(0x7f0000000280)={0x20, 0x31, 0xcf, "52a87422eeed8e0c94a4692901fcc428d6d1c7b2eb85ca21849fa7734d562854fb550b3651665f48c7102d3d249bd4c1ebf4e11a81551550e1b233b1efff186a3accffb9760151b3a9a232a0c444049e7af4617ff3de6b2cac7491516b3d19baaaa19e7573d0254940f10cf8a39c022c5f14bc6411c9e775f611b542e52e19c9cd227a6ce8781472bf603c43a7563fd7befa1a4e0a4ee1de2cb09cdfce66c363be73ee502501bb1e89ab7567d961c2c77a3af188211c1a84ea7d7c2e39abd57abaff02ce5d629d658f7980bfe219e1"}, &(0x7f00000001c0)={0x0, 0xa, 0x1}, &(0x7f0000000200)={0x0, 0x8, 0x1}, &(0x7f0000000380)={0x20, 0x0, 0x15, {0x13, "7cc0a304478b81f1ffc1c5f12d4751771825d2"}}, &(0x7f00000003c0)={0x20, 0x1, 0x1, 0x20}, &(0x7f0000000400)={0x20, 0x0, 0x1}}) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:09:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x5, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:09:58 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x88a8ffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:58 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 27) 20:09:58 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd0720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:09:58 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x74000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1068.269220][T18580] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1068.269359][T18581] FAULT_INJECTION: forcing a failure. [ 1068.269359][T18581] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.302732][T18580] team365: entered promiscuous mode [ 1068.307117][T18581] CPU: 0 PID: 18581 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1068.308537][T18580] 8021q: adding VLAN 0 to HW filter on device team365 [ 1068.318353][T18581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1068.318368][T18581] Call Trace: [ 1068.318375][T18581] [ 1068.318382][T18581] dump_stack_lvl+0x125/0x1b0 [ 1068.318413][T18581] should_fail_ex+0x496/0x5b0 [ 1068.318443][T18581] should_failslab+0x9/0x20 [ 1068.318469][T18581] kmem_cache_alloc+0x33a/0x3b0 [ 1068.344897][T18578] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1068.346234][T18581] vm_area_dup+0x21/0x2f0 [ 1068.346266][T18581] __split_vma+0x1a8/0x830 [ 1068.378229][T18581] ? generic_get_unmapped_area_topdown+0x670/0x670 [ 1068.384875][T18581] do_vmi_align_munmap+0x41f/0x1710 [ 1068.390121][T18581] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1068.396129][T18581] ? __split_vma+0x830/0x830 [ 1068.400725][T18581] ? mtree_range_walk+0x654/0x9a0 [ 1068.405763][T18581] do_vmi_munmap+0x20e/0x450 [ 1068.410363][T18581] __vm_munmap+0x144/0x390 [ 1068.414784][T18581] ? do_vmi_munmap+0x450/0x450 [ 1068.419550][T18581] ? __ia32_sys_read+0xb0/0xb0 [ 1068.424324][T18581] __x64_sys_munmap+0x62/0x80 [ 1068.429006][T18581] do_syscall_64+0x38/0xb0 [ 1068.433419][T18581] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1068.439308][T18581] RIP: 0033:0x7ffba087cb77 [ 1068.443715][T18581] Code: 00 00 00 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 20:09:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x6, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1068.463327][T18581] RSP: 002b:00007ffba159ae98 EFLAGS: 00000246 ORIG_RAX: 000000000000000b [ 1068.471740][T18581] RAX: ffffffffffffffda RBX: 0000000000003000 RCX: 00007ffba087cb77 [ 1068.479712][T18581] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 00007ffb96fff000 [ 1068.487683][T18581] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1068.495647][T18581] R10: 0000000020004402 R11: 0000000000000246 R12: 0000000000000004 [ 1068.503614][T18581] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1068.511592][T18581] 20:09:58 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 28) 20:09:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x7, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1068.541650][T18578] team378: entered promiscuous mode [ 1068.559030][T18578] 8021q: adding VLAN 0 to HW filter on device team378 20:09:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x8, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1068.592866][T18592] FAULT_INJECTION: forcing a failure. [ 1068.592866][T18592] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.606203][T18592] CPU: 1 PID: 18592 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1068.616647][T18592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1068.626732][T18592] Call Trace: [ 1068.630024][T18592] [ 1068.632968][T18592] dump_stack_lvl+0x125/0x1b0 [ 1068.637682][T18592] should_fail_ex+0x496/0x5b0 20:09:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0xa, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1068.642395][T18592] should_failslab+0x9/0x20 [ 1068.646936][T18592] kmem_cache_alloc+0x33a/0x3b0 [ 1068.651823][T18592] vm_area_dup+0x21/0x2f0 [ 1068.656185][T18592] __split_vma+0x1a8/0x830 [ 1068.660639][T18592] ? generic_get_unmapped_area_topdown+0x670/0x670 [ 1068.667181][T18592] do_vmi_align_munmap+0x41f/0x1710 [ 1068.672430][T18592] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1068.678453][T18592] ? __split_vma+0x830/0x830 [ 1068.683078][T18592] ? mtree_range_walk+0x654/0x9a0 [ 1068.688157][T18592] do_vmi_munmap+0x20e/0x450 20:09:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0xe, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1068.692779][T18592] __vm_munmap+0x144/0x390 [ 1068.697228][T18592] ? do_vmi_munmap+0x450/0x450 [ 1068.702033][T18592] ? __ia32_sys_read+0xb0/0xb0 [ 1068.706936][T18592] __x64_sys_munmap+0x62/0x80 [ 1068.711647][T18592] do_syscall_64+0x38/0xb0 [ 1068.716100][T18592] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1068.722028][T18592] RIP: 0033:0x7ffba087cb77 [ 1068.726461][T18592] Code: 00 00 00 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1068.746098][T18592] RSP: 002b:00007ffba159ae98 EFLAGS: 00000246 ORIG_RAX: 000000000000000b [ 1068.754532][T18592] RAX: ffffffffffffffda RBX: 0000000000003000 RCX: 00007ffba087cb77 [ 1068.762523][T18592] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 00007ffb96fff000 [ 1068.770520][T18592] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1068.778507][T18592] R10: 0000000020004402 R11: 0000000000000246 R12: 0000000000000004 [ 1068.786532][T18592] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1068.794633][T18592] [ 1068.807768][ T6580] usb 5-1: new high-speed USB device number 24 using dummy_hcd [ 1068.875816][T18586] gre298: entered promiscuous mode [ 1068.889224][T18586] team365: Port device gre298 added [ 1068.894723][T18587] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1068.919276][T18587] team374: entered promiscuous mode [ 1068.924744][T18587] 8021q: adding VLAN 0 to HW filter on device team374 [ 1069.012757][T18585] gre308: entered promiscuous mode [ 1069.020644][T18585] team378: Port device gre308 added [ 1069.115674][T18590] gre305: entered promiscuous mode [ 1069.123042][T18590] team374: Port device gre305 added [ 1069.197776][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1069.217328][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1069.227065][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1069.259342][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1069.277398][ T6580] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1069.307490][ T6580] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1069.316559][ T6580] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1069.339957][ T6580] usb 5-1: config 0 descriptor?? 20:10:00 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, &(0x7f00000002c0)={0x24, &(0x7f00000000c0)={0x20, 0x1, 0x94, {0x94, 0x23, "0c27f8e303e364ab9221d9e0d722054bd38562c20d2437193e283c16a4d7c5bc79753ac9f9b9a1ad3518e97fcda1166ba65e6e08b41ec86779a6851a94da60423a79a4689ef840beefcc1109716e83b71a9021af4b514baace1dad025e6d14b877bcac128010eefd3ccba744c40e09073373331e21e81f4473935a64e23bb45808f2bed8608401590dfd4974a184f99c5a49"}}, &(0x7f0000000180)={0x0, 0x3, 0x95, @string={0x95, 0x3, "dfe3265894e092230d13649a15e30903447a2b6eb703ceb2ea6140d166bd9aa8fc88d559a1f2935bdc44789a2ff7bb3be02b666f622ce21cd98b920f0116d33285e596fafbd7a67cf834b1e18336edf33a2983ae2692c0c533c7fa90584459ce8927a0bf60c5a51c82a3e43efdd58df95ab243f6898d06bfe7c0552c4c6313c3d83363ceedd1c191264588abc44eb2651ef387"}}, &(0x7f0000000040)={0x0, 0x22, 0xa, {[@global=@item_4={0x3, 0x1, 0xf86cc90504e0fb14, "01f8f5ad"}, @local=@item_4={0x3, 0x2, 0x1, "8eaf6cc8"}]}}, &(0x7f0000000280)={0x0, 0x21, 0x9, {0x9, 0x21, 0x2, 0x2, 0x1, {0x22, 0xcd7}}}}, &(0x7f0000000500)={0x2c, &(0x7f0000000300)={0x20, 0x31, 0x6a, "28fc32c07020453233433adab2dfbc1d16f0cccbc3548ad065144ef9957d9b90b26f0321c154360d3e0aed74424d4b7e190ac444febd374305fc7d966b9e31f0557a522d002cc4db1457292b0de0d850444bf7573662e123dd5defa6f450d2b4839d4b43a9bd03bfe3e8"}, &(0x7f0000000380)={0x0, 0xa, 0x1, 0x1}, &(0x7f00000003c0)={0x0, 0x8, 0x1, 0x3}, &(0x7f0000000400)={0x20, 0x1, 0x7c, "bc74e0aaa6dacf591bfc30e44dd4fa66fd554758251ef5791af42a2a630f95328f4876048f0b3d7a78a9e551a29ecec969e9d16a69e8f4ee3ad6a82b98935841ac1246a750f60dd0cd60e016319f273796a5c2c4cf86c8e8979ea882ab36714a56d8da3c9f9a95905ffdc24f166305b5de458dd6494500f51cea7daf"}, &(0x7f00000004c0)={0x20, 0x3, 0x1}}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_connect$uac1(0x2, 0xc7, &(0x7f00000009c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0xff, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xb5, 0x3, 0x1, 0x3, 0x60, 0x7d, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0xfff9, 0x2b}, [@input_terminal={0xc, 0x24, 0x2, 0x1, 0x206, 0x4, 0x8, 0x0, 0x76, 0x7f}, @feature_unit={0xd, 0x24, 0x6, 0x1, 0x4, 0x3, [0x5, 0x9, 0x4], 0x1}, @selector_unit={0x8, 0x24, 0x5, 0x5, 0x6, "6f0cbc"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x0, 0xc1, 0x7}, @format_type_i_continuous={0xb, 0x24, 0x2, 0x1, 0x40, 0x3, 0xf8, 0x9, '\'X', "aa"}, @format_type_i_continuous={0xe, 0x24, 0x2, 0x1, 0x3, 0x3, 0x1, 0x37, "2ecb93", "807cc4"}, @format_type_i_continuous={0x9, 0x24, 0x2, 0x1, 0x3, 0x3, 0x2, 0x7, "", "15"}]}, {{0x9, 0x5, 0x1, 0x9, 0x3ff, 0x1, 0x5, 0x7f, {0x7, 0x25, 0x1, 0x80, 0xdf, 0x4}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x0, 0x1, 0x6, 0x7, "8b1e"}]}, {{0x9, 0x5, 0x82, 0x9, 0x8, 0x27, 0x8, 0x0, {0x7, 0x25, 0x1, 0x82, 0x58, 0x5}}}}}}}]}}, &(0x7f0000000ec0)={0xa, &(0x7f0000000ac0)={0xa, 0x6, 0x201, 0x3f, 0x0, 0x3d, 0xff, 0x9}, 0x37, &(0x7f0000000b00)={0x5, 0xf, 0x37, 0x3, [@wireless={0xb, 0x10, 0x1, 0xa, 0x2, 0x2, 0x8, 0x3a, 0x9}, @generic={0x1c, 0x10, 0x3, "11c33bcf35537b9bc864febc9ec3f525f8a3f43ea949bcdb5a"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x1, 0x7f, 0x0, 0xffff}]}, 0x6, [{0x7, &(0x7f0000000b40)=@string={0x7, 0x3, "0db31aa46e"}}, {0x4, &(0x7f0000000b80)=@lang_id={0x4, 0x3, 0x3401}}, {0x4, &(0x7f0000000bc0)=@lang_id={0x4, 0x3, 0x200a}}, {0x5a, &(0x7f0000000c00)=@string={0x5a, 0x3, "0c12f1a59a365c63761c3e0c4a2ecca323d0e5c835d03724fd2b7f784ae36a20dd0ada04c887c133a864af9b3bb4a56f96480f0deee2b9f010db1477366eb4608c91026ffeb05653edacc72f33e6e9a79afc0b7a5f36ccdb"}}, {0x101, &(0x7f0000000c80)=@string={0x101, 0x3, "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"}}, {0xe8, &(0x7f0000000dc0)=@string={0xe8, 0x3, "a838b9fb3ec1ea5755a50928c642aa4fe762de02192817e34a2ecfa068a29411a98173f7959b20eb1a72badbf48f876860945020fbcaec2edb768b96f2f251d253234c866cb5f8c5a5721091d7f8b92d01c4a6a09fa0a158577af77a232d122a1b5088af080ff6a4cabee326d58933f5a3ce6014ddc26905785b420d0f18a753b22dc4b0d1f37b3c78172636de46bab2443fe1c819715f8aa7a6fcc4ad2ea6041b43e921a44ffe072cdb3bcbf49ba807470225772e517c5c5f2d82144d4e172ce36076e6bee69aa91ec60cbffe2ded024450513a7144e6a68b42615670f9d4db346d38970afe"}}]}) r1 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_disconnect(r1) syz_usb_control_io$hid(r1, &(0x7f0000000740)={0x24, &(0x7f0000000540)={0x0, 0x11, 0x2e, {0x2e, 0x5, "ac9a142b7271ce5e4c5cd565f0f844f23901b4ab79f5c9d7dc7ff5969960075ccaa7ab732674b593b0caf0b6"}}, &(0x7f0000000580)={0x0, 0x3, 0xff, @string={0xff, 0x3, "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"}}, &(0x7f00000006c0)={0x0, 0x22, 0x1d, {[@global=@item_4={0x3, 0x1, 0x7, "c4cd9930"}, @local=@item_012={0x0, 0x2, 0x8}, @global=@item_012={0x2, 0x1, 0x5, "53d5"}, @global=@item_4={0x3, 0x1, 0x2, "aef11499"}, @main=@item_012={0x2, 0x0, 0xa, "e719"}, @local=@item_012={0x0, 0x2, 0x3}, @local=@item_4={0x3, 0x2, 0x1, "abd818c5"}, @local=@item_012={0x0, 0x2, 0x9}, @local=@item_4={0x3, 0x2, 0x8, "398edf2f"}]}}, &(0x7f0000000700)={0x0, 0x21, 0x9, {0x9, 0x21, 0x9, 0x8, 0x1, {0x22, 0x4e4}}}}, &(0x7f0000000980)={0x2c, &(0x7f0000000780)={0x20, 0xd, 0x2a, "129f5521b85c7167da784419ef23b753f321e00246d5b493b318234d52e1b600268858014e25c5d5ebd8"}, &(0x7f00000007c0)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000800)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000000840)={0x20, 0x1, 0xce, "6fb7e61f9ab440b7bf45321e0258d7232ab140ced1f64948320feeb8762db8e66d6d87c2ae4372c71255922e1e0538b1800ac4de18c08f546a97fecc7729919867a30233b85e8bf42b6a62898fedd4bde747de79b2d29044979ec765d5deb451eb8e08c16a2ce12344e51354e51cf726de9bb9eeea984496e4df429db7949fe9588bd3d3517a6d08c8341d670f048e5ba611e689bc005adfac11859afad463519a1ecad1090906fa00a39dfb1af214bf4040dfe15b66445b70d1ed85c23ca546dcfc6399f4faa871e62a0818711e"}, &(0x7f0000000940)={0x20, 0x3, 0x1, 0x9}}) 20:10:00 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd1720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:00 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x8a000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x11, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:00 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 29) 20:10:00 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x78000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1069.644589][T18611] FAULT_INJECTION: forcing a failure. [ 1069.644589][T18611] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.658858][T18613] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1069.670256][T18611] CPU: 0 PID: 18611 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1069.680704][T18611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1069.690769][T18611] Call Trace: [ 1069.694066][T18611] [ 1069.697020][T18611] dump_stack_lvl+0x125/0x1b0 [ 1069.698773][T18613] team366: entered promiscuous mode [ 1069.701733][T18611] should_fail_ex+0x496/0x5b0 [ 1069.701769][T18611] should_failslab+0x9/0x20 [ 1069.707329][T18613] 8021q: adding VLAN 0 to HW filter on device team366 [ 1069.711621][T18611] kmem_cache_alloc+0x33a/0x3b0 [ 1069.711661][T18611] vm_area_dup+0x53/0x2f0 [ 1069.711685][T18611] __split_vma+0x1a8/0x830 [ 1069.736515][T18611] ? generic_get_unmapped_area_topdown+0x670/0x670 [ 1069.743051][T18611] do_vmi_align_munmap+0x41f/0x1710 [ 1069.748271][T18611] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1069.754287][T18611] ? __split_vma+0x830/0x830 [ 1069.758926][T18611] ? mtree_range_walk+0x654/0x9a0 [ 1069.763992][T18611] do_vmi_munmap+0x20e/0x450 [ 1069.768617][T18611] __vm_munmap+0x144/0x390 [ 1069.771818][ T6580] usbhid 5-1:0.0: can't add hid device: -71 [ 1069.773047][T18611] ? do_vmi_munmap+0x450/0x450 [ 1069.773085][T18611] ? __ia32_sys_read+0xb0/0xb0 [ 1069.786287][ T6580] usbhid: probe of 5-1:0.0 failed with error -71 20:10:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x14, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1069.788458][T18611] __x64_sys_munmap+0x62/0x80 [ 1069.788491][T18611] do_syscall_64+0x38/0xb0 [ 1069.788512][T18611] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1069.802076][ T6580] usb 5-1: USB disconnect, device number 24 [ 1069.803894][T18611] RIP: 0033:0x7ffba087cb77 [ 1069.803915][T18611] Code: 00 00 00 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 20:10:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x28, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1069.803935][T18611] RSP: 002b:00007ffba159ae98 EFLAGS: 00000246 ORIG_RAX: 000000000000000b [ 1069.848173][T18611] RAX: ffffffffffffffda RBX: 0000000000003000 RCX: 00007ffba087cb77 [ 1069.856170][T18611] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 00007ffb96fff000 [ 1069.864156][T18611] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1069.872155][T18611] R10: 0000000020004402 R11: 0000000000000246 R12: 0000000000000004 [ 1069.880148][T18611] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1069.888145][T18611] 20:10:00 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 30) 20:10:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x36, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1069.944880][T18613] gre299: entered promiscuous mode 20:10:00 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x7a000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1069.974822][T18625] FAULT_INJECTION: forcing a failure. [ 1069.974822][T18625] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.980822][T18613] team366: Port device gre299 added [ 1069.992664][T18625] CPU: 0 PID: 18625 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1070.003649][T18625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1070.013733][T18625] Call Trace: [ 1070.017033][T18625] [ 1070.019975][T18625] dump_stack_lvl+0x125/0x1b0 20:10:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x60, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1070.024676][T18625] should_fail_ex+0x496/0x5b0 [ 1070.029387][T18625] should_failslab+0x9/0x20 [ 1070.033943][T18625] kmem_cache_alloc_bulk+0x57/0x7c0 [ 1070.039175][T18625] ? kmem_cache_alloc+0x34e/0x3b0 [ 1070.044241][T18625] mas_alloc_nodes+0x39c/0x830 [ 1070.049062][T18625] mas_preallocate+0x2b1/0x370 [ 1070.053960][T18625] __split_vma+0x1c7/0x830 [ 1070.058414][T18625] ? generic_get_unmapped_area_topdown+0x670/0x670 [ 1070.064485][T18606] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1070.064941][T18625] do_vmi_align_munmap+0x41f/0x1710 [ 1070.064978][T18625] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1070.085362][T18625] ? __split_vma+0x830/0x830 [ 1070.089984][T18625] ? mtree_range_walk+0x654/0x9a0 [ 1070.095046][T18625] do_vmi_munmap+0x20e/0x450 [ 1070.095602][T18606] team379: entered promiscuous mode [ 1070.099727][T18625] __vm_munmap+0x144/0x390 [ 1070.099758][T18625] ? do_vmi_munmap+0x450/0x450 [ 1070.099790][T18625] __x64_sys_munmap+0x62/0x80 [ 1070.105390][T18606] 8021q: adding VLAN 0 to HW filter on device team379 [ 1070.109368][T18625] do_syscall_64+0x38/0xb0 [ 1070.109397][T18625] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1070.109421][T18625] RIP: 0033:0x7ffba087cb77 [ 1070.109438][T18625] Code: 00 00 00 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1070.109459][T18625] RSP: 002b:00007ffba159ae98 EFLAGS: 00000246 [ 1070.124282][T18619] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1070.125592][T18625] ORIG_RAX: 000000000000000b [ 1070.125603][T18625] RAX: ffffffffffffffda RBX: 0000000000003000 RCX: 00007ffba087cb77 [ 1070.125617][T18625] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 00007ffb96fff000 [ 1070.125630][T18625] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1070.125643][T18625] R10: 0000000020004402 R11: 0000000000000246 R12: 0000000000000004 [ 1070.145810][T18619] team375: entered promiscuous mode [ 1070.159932][T18625] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1070.159962][T18625] [ 1070.231618][T18619] 8021q: adding VLAN 0 to HW filter on device team375 [ 1070.307602][ T6580] usb 5-1: new high-speed USB device number 25 using dummy_hcd [ 1070.339987][T18620] gre309: entered promiscuous mode [ 1070.347673][T18620] team379: Port device gre309 added [ 1070.435404][T18623] gre306: entered promiscuous mode [ 1070.442779][T18623] team375: Port device gre306 added [ 1070.591574][T18632] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1070.609704][T18632] team367: entered promiscuous mode [ 1070.615234][T18632] 8021q: adding VLAN 0 to HW filter on device team367 [ 1070.712032][T18633] gre300: entered promiscuous mode [ 1070.725577][T18633] team367: Port device gre300 added [ 1070.737601][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1070.756741][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1070.767165][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1070.784724][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1070.795763][ T6580] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1070.810221][ T6580] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1070.820344][ T6580] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1070.831703][ T6580] usb 5-1: config 0 descriptor?? [ 1071.358194][ T6580] keytouch 0003:0926:3333.006A: fixing up Keytouch IEC report descriptor [ 1071.368816][ T6580] keytouch 0003:0926:3333.006A: usb_submit_urb(out) failed: -90 [ 1071.381481][ T6580] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.006A/input/input117 [ 1071.477010][ T6580] keytouch 0003:0926:3333.006A: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 1071.559235][T18615] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1071.570589][T18615] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1071.579264][T18615] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1071.587948][T18615] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1071.800452][T12659] usb 5-1: USB disconnect, device number 25 20:10:02 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, &(0x7f00000002c0)={0x24, &(0x7f00000000c0)={0x20, 0x1, 0x94, {0x94, 0x23, "0c27f8e303e364ab9221d9e0d722054bd38562c20d2437193e283c16a4d7c5bc79753ac9f9b9a1ad3518e97fcda1166ba65e6e08b41ec86779a6851a94da60423a79a4689ef840beefcc1109716e83b71a9021af4b514baace1dad025e6d14b877bcac128010eefd3ccba744c40e09073373331e21e81f4473935a64e23bb45808f2bed8608401590dfd4974a184f99c5a49"}}, &(0x7f0000000180)={0x0, 0x3, 0x95, @string={0x95, 0x3, "dfe3265894e092230d13649a15e30903447a2b6eb703ceb2ea6140d166bd9aa8fc88d559a1f2935bdc44789a2ff7bb3be02b666f622ce21cd98b920f0116d33285e596fafbd7a67cf834b1e18336edf33a2983ae2692c0c533c7fa90584459ce8927a0bf60c5a51c82a3e43efdd58df95ab243f6898d06bfe7c0552c4c6313c3d83363ceedd1c191264588abc44eb2651ef387"}}, &(0x7f0000000040)={0x0, 0x22, 0xa, {[@global=@item_4={0x3, 0x1, 0xf86cc90504e0fb14, "01f8f5ad"}, @local=@item_4={0x3, 0x2, 0x1, "8eaf6cc8"}]}}, &(0x7f0000000280)={0x0, 0x21, 0x9, {0x9, 0x21, 0x2, 0x2, 0x1, {0x22, 0xcd7}}}}, &(0x7f0000000500)={0x2c, &(0x7f0000000300)={0x20, 0x31, 0x6a, "28fc32c07020453233433adab2dfbc1d16f0cccbc3548ad065144ef9957d9b90b26f0321c154360d3e0aed74424d4b7e190ac444febd374305fc7d966b9e31f0557a522d002cc4db1457292b0de0d850444bf7573662e123dd5defa6f450d2b4839d4b43a9bd03bfe3e8"}, &(0x7f0000000380)={0x0, 0xa, 0x1, 0x1}, &(0x7f00000003c0)={0x0, 0x8, 0x1, 0x3}, &(0x7f0000000400)={0x20, 0x1, 0x7c, "bc74e0aaa6dacf591bfc30e44dd4fa66fd554758251ef5791af42a2a630f95328f4876048f0b3d7a78a9e551a29ecec969e9d16a69e8f4ee3ad6a82b98935841ac1246a750f60dd0cd60e016319f273796a5c2c4cf86c8e8979ea882ab36714a56d8da3c9f9a95905ffdc24f166305b5de458dd6494500f51cea7daf"}, &(0x7f00000004c0)={0x20, 0x3, 0x1}}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_connect$uac1(0x2, 0xc7, &(0x7f00000009c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0xff, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xb5, 0x3, 0x1, 0x3, 0x60, 0x7d, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0xfff9, 0x2b}, [@input_terminal={0xc, 0x24, 0x2, 0x1, 0x206, 0x4, 0x8, 0x0, 0x76, 0x7f}, @feature_unit={0xd, 0x24, 0x6, 0x1, 0x4, 0x3, [0x5, 0x9, 0x4], 0x1}, @selector_unit={0x8, 0x24, 0x5, 0x5, 0x6, "6f0cbc"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x0, 0xc1, 0x7}, @format_type_i_continuous={0xb, 0x24, 0x2, 0x1, 0x40, 0x3, 0xf8, 0x9, '\'X', "aa"}, @format_type_i_continuous={0xe, 0x24, 0x2, 0x1, 0x3, 0x3, 0x1, 0x37, "2ecb93", "807cc4"}, @format_type_i_continuous={0x9, 0x24, 0x2, 0x1, 0x3, 0x3, 0x2, 0x7, "", "15"}]}, {{0x9, 0x5, 0x1, 0x9, 0x3ff, 0x1, 0x5, 0x7f, {0x7, 0x25, 0x1, 0x80, 0xdf, 0x4}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x0, 0x1, 0x6, 0x7, "8b1e"}]}, {{0x9, 0x5, 0x82, 0x9, 0x8, 0x27, 0x8, 0x0, {0x7, 0x25, 0x1, 0x82, 0x58, 0x5}}}}}}}]}}, &(0x7f0000000ec0)={0xa, &(0x7f0000000ac0)={0xa, 0x6, 0x201, 0x3f, 0x0, 0x3d, 0xff, 0x9}, 0x37, &(0x7f0000000b00)={0x5, 0xf, 0x37, 0x3, [@wireless={0xb, 0x10, 0x1, 0xa, 0x2, 0x2, 0x8, 0x3a, 0x9}, @generic={0x1c, 0x10, 0x3, "11c33bcf35537b9bc864febc9ec3f525f8a3f43ea949bcdb5a"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x1, 0x7f, 0x0, 0xffff}]}, 0x6, [{0x7, &(0x7f0000000b40)=@string={0x7, 0x3, "0db31aa46e"}}, {0x4, &(0x7f0000000b80)=@lang_id={0x4, 0x3, 0x3401}}, {0x4, &(0x7f0000000bc0)=@lang_id={0x4, 0x3, 0x200a}}, {0x5a, &(0x7f0000000c00)=@string={0x5a, 0x3, "0c12f1a59a365c63761c3e0c4a2ecca323d0e5c835d03724fd2b7f784ae36a20dd0ada04c887c133a864af9b3bb4a56f96480f0deee2b9f010db1477366eb4608c91026ffeb05653edacc72f33e6e9a79afc0b7a5f36ccdb"}}, {0x101, &(0x7f0000000c80)=@string={0x101, 0x3, "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"}}, {0xe8, &(0x7f0000000dc0)=@string={0xe8, 0x3, "a838b9fb3ec1ea5755a50928c642aa4fe762de02192817e34a2ecfa068a29411a98173f7959b20eb1a72badbf48f876860945020fbcaec2edb768b96f2f251d253234c866cb5f8c5a5721091d7f8b92d01c4a6a09fa0a158577af77a232d122a1b5088af080ff6a4cabee326d58933f5a3ce6014ddc26905785b420d0f18a753b22dc4b0d1f37b3c78172636de46bab2443fe1c819715f8aa7a6fcc4ad2ea6041b43e921a44ffe072cdb3bcbf49ba807470225772e517c5c5f2d82144d4e172ce36076e6bee69aa91ec60cbffe2ded024450513a7144e6a68b42615670f9d4db346d38970afe"}}]}) r1 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_disconnect(r1) syz_usb_control_io$hid(r1, &(0x7f0000000740)={0x24, &(0x7f0000000540)={0x0, 0x11, 0x2e, {0x2e, 0x5, "ac9a142b7271ce5e4c5cd565f0f844f23901b4ab79f5c9d7dc7ff5969960075ccaa7ab732674b593b0caf0b6"}}, &(0x7f0000000580)={0x0, 0x3, 0xff, @string={0xff, 0x3, "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"}}, &(0x7f00000006c0)={0x0, 0x22, 0x1d, {[@global=@item_4={0x3, 0x1, 0x7, "c4cd9930"}, @local=@item_012={0x0, 0x2, 0x8}, @global=@item_012={0x2, 0x1, 0x5, "53d5"}, @global=@item_4={0x3, 0x1, 0x2, "aef11499"}, @main=@item_012={0x2, 0x0, 0xa, "e719"}, @local=@item_012={0x0, 0x2, 0x3}, @local=@item_4={0x3, 0x2, 0x1, "abd818c5"}, @local=@item_012={0x0, 0x2, 0x9}, @local=@item_4={0x3, 0x2, 0x8, "398edf2f"}]}}, &(0x7f0000000700)={0x0, 0x21, 0x9, {0x9, 0x21, 0x9, 0x8, 0x1, {0x22, 0x4e4}}}}, &(0x7f0000000980)={0x2c, &(0x7f0000000780)={0x20, 0xd, 0x2a, "129f5521b85c7167da784419ef23b753f321e00246d5b493b318234d52e1b600268858014e25c5d5ebd8"}, &(0x7f00000007c0)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000800)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000000840)={0x20, 0x1, 0xce, "6fb7e61f9ab440b7bf45321e0258d7232ab140ced1f64948320feeb8762db8e66d6d87c2ae4372c71255922e1e0538b1800ac4de18c08f546a97fecc7729919867a30233b85e8bf42b6a62898fedd4bde747de79b2d29044979ec765d5deb451eb8e08c16a2ce12344e51354e51cf726de9bb9eeea984496e4df429db7949fe9588bd3d3517a6d08c8341d670f048e5ba611e689bc005adfac11859afad463519a1ecad1090906fa00a39dfb1af214bf4040dfe15b66445b70d1ed85c23ca546dcfc6399f4faa871e62a0818711e"}, &(0x7f0000000940)={0x20, 0x3, 0x1, 0x9}}) syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) (async) syz_usb_control_io$hid(r0, &(0x7f00000002c0)={0x24, &(0x7f00000000c0)={0x20, 0x1, 0x94, {0x94, 0x23, "0c27f8e303e364ab9221d9e0d722054bd38562c20d2437193e283c16a4d7c5bc79753ac9f9b9a1ad3518e97fcda1166ba65e6e08b41ec86779a6851a94da60423a79a4689ef840beefcc1109716e83b71a9021af4b514baace1dad025e6d14b877bcac128010eefd3ccba744c40e09073373331e21e81f4473935a64e23bb45808f2bed8608401590dfd4974a184f99c5a49"}}, &(0x7f0000000180)={0x0, 0x3, 0x95, @string={0x95, 0x3, "dfe3265894e092230d13649a15e30903447a2b6eb703ceb2ea6140d166bd9aa8fc88d559a1f2935bdc44789a2ff7bb3be02b666f622ce21cd98b920f0116d33285e596fafbd7a67cf834b1e18336edf33a2983ae2692c0c533c7fa90584459ce8927a0bf60c5a51c82a3e43efdd58df95ab243f6898d06bfe7c0552c4c6313c3d83363ceedd1c191264588abc44eb2651ef387"}}, &(0x7f0000000040)={0x0, 0x22, 0xa, {[@global=@item_4={0x3, 0x1, 0xf86cc90504e0fb14, "01f8f5ad"}, @local=@item_4={0x3, 0x2, 0x1, "8eaf6cc8"}]}}, &(0x7f0000000280)={0x0, 0x21, 0x9, {0x9, 0x21, 0x2, 0x2, 0x1, {0x22, 0xcd7}}}}, &(0x7f0000000500)={0x2c, &(0x7f0000000300)={0x20, 0x31, 0x6a, "28fc32c07020453233433adab2dfbc1d16f0cccbc3548ad065144ef9957d9b90b26f0321c154360d3e0aed74424d4b7e190ac444febd374305fc7d966b9e31f0557a522d002cc4db1457292b0de0d850444bf7573662e123dd5defa6f450d2b4839d4b43a9bd03bfe3e8"}, &(0x7f0000000380)={0x0, 0xa, 0x1, 0x1}, &(0x7f00000003c0)={0x0, 0x8, 0x1, 0x3}, &(0x7f0000000400)={0x20, 0x1, 0x7c, "bc74e0aaa6dacf591bfc30e44dd4fa66fd554758251ef5791af42a2a630f95328f4876048f0b3d7a78a9e551a29ecec969e9d16a69e8f4ee3ad6a82b98935841ac1246a750f60dd0cd60e016319f273796a5c2c4cf86c8e8979ea882ab36714a56d8da3c9f9a95905ffdc24f166305b5de458dd6494500f51cea7daf"}, &(0x7f00000004c0)={0x20, 0x3, 0x1}}) (async) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) syz_usb_connect$uac1(0x2, 0xc7, &(0x7f00000009c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0xff, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xb5, 0x3, 0x1, 0x3, 0x60, 0x7d, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0xfff9, 0x2b}, [@input_terminal={0xc, 0x24, 0x2, 0x1, 0x206, 0x4, 0x8, 0x0, 0x76, 0x7f}, @feature_unit={0xd, 0x24, 0x6, 0x1, 0x4, 0x3, [0x5, 0x9, 0x4], 0x1}, @selector_unit={0x8, 0x24, 0x5, 0x5, 0x6, "6f0cbc"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x0, 0xc1, 0x7}, @format_type_i_continuous={0xb, 0x24, 0x2, 0x1, 0x40, 0x3, 0xf8, 0x9, '\'X', "aa"}, @format_type_i_continuous={0xe, 0x24, 0x2, 0x1, 0x3, 0x3, 0x1, 0x37, "2ecb93", "807cc4"}, @format_type_i_continuous={0x9, 0x24, 0x2, 0x1, 0x3, 0x3, 0x2, 0x7, "", "15"}]}, {{0x9, 0x5, 0x1, 0x9, 0x3ff, 0x1, 0x5, 0x7f, {0x7, 0x25, 0x1, 0x80, 0xdf, 0x4}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x0, 0x1, 0x6, 0x7, "8b1e"}]}, {{0x9, 0x5, 0x82, 0x9, 0x8, 0x27, 0x8, 0x0, {0x7, 0x25, 0x1, 0x82, 0x58, 0x5}}}}}}}]}}, &(0x7f0000000ec0)={0xa, &(0x7f0000000ac0)={0xa, 0x6, 0x201, 0x3f, 0x0, 0x3d, 0xff, 0x9}, 0x37, &(0x7f0000000b00)={0x5, 0xf, 0x37, 0x3, [@wireless={0xb, 0x10, 0x1, 0xa, 0x2, 0x2, 0x8, 0x3a, 0x9}, @generic={0x1c, 0x10, 0x3, "11c33bcf35537b9bc864febc9ec3f525f8a3f43ea949bcdb5a"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x1, 0x7f, 0x0, 0xffff}]}, 0x6, [{0x7, &(0x7f0000000b40)=@string={0x7, 0x3, "0db31aa46e"}}, {0x4, &(0x7f0000000b80)=@lang_id={0x4, 0x3, 0x3401}}, {0x4, &(0x7f0000000bc0)=@lang_id={0x4, 0x3, 0x200a}}, {0x5a, &(0x7f0000000c00)=@string={0x5a, 0x3, "0c12f1a59a365c63761c3e0c4a2ecca323d0e5c835d03724fd2b7f784ae36a20dd0ada04c887c133a864af9b3bb4a56f96480f0deee2b9f010db1477366eb4608c91026ffeb05653edacc72f33e6e9a79afc0b7a5f36ccdb"}}, {0x101, &(0x7f0000000c80)=@string={0x101, 0x3, "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"}}, {0xe8, &(0x7f0000000dc0)=@string={0xe8, 0x3, "a838b9fb3ec1ea5755a50928c642aa4fe762de02192817e34a2ecfa068a29411a98173f7959b20eb1a72badbf48f876860945020fbcaec2edb768b96f2f251d253234c866cb5f8c5a5721091d7f8b92d01c4a6a09fa0a158577af77a232d122a1b5088af080ff6a4cabee326d58933f5a3ce6014ddc26905785b420d0f18a753b22dc4b0d1f37b3c78172636de46bab2443fe1c819715f8aa7a6fcc4ad2ea6041b43e921a44ffe072cdb3bcbf49ba807470225772e517c5c5f2d82144d4e172ce36076e6bee69aa91ec60cbffe2ded024450513a7144e6a68b42615670f9d4db346d38970afe"}}]}) (async) syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) (async) syz_usb_control_io(r1, 0x0, 0x0) (async) syz_usb_disconnect(r1) (async) syz_usb_control_io$hid(r1, &(0x7f0000000740)={0x24, &(0x7f0000000540)={0x0, 0x11, 0x2e, {0x2e, 0x5, "ac9a142b7271ce5e4c5cd565f0f844f23901b4ab79f5c9d7dc7ff5969960075ccaa7ab732674b593b0caf0b6"}}, &(0x7f0000000580)={0x0, 0x3, 0xff, @string={0xff, 0x3, "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"}}, &(0x7f00000006c0)={0x0, 0x22, 0x1d, {[@global=@item_4={0x3, 0x1, 0x7, "c4cd9930"}, @local=@item_012={0x0, 0x2, 0x8}, @global=@item_012={0x2, 0x1, 0x5, "53d5"}, @global=@item_4={0x3, 0x1, 0x2, "aef11499"}, @main=@item_012={0x2, 0x0, 0xa, "e719"}, @local=@item_012={0x0, 0x2, 0x3}, @local=@item_4={0x3, 0x2, 0x1, "abd818c5"}, @local=@item_012={0x0, 0x2, 0x9}, @local=@item_4={0x3, 0x2, 0x8, "398edf2f"}]}}, &(0x7f0000000700)={0x0, 0x21, 0x9, {0x9, 0x21, 0x9, 0x8, 0x1, {0x22, 0x4e4}}}}, &(0x7f0000000980)={0x2c, &(0x7f0000000780)={0x20, 0xd, 0x2a, "129f5521b85c7167da784419ef23b753f321e00246d5b493b318234d52e1b600268858014e25c5d5ebd8"}, &(0x7f00000007c0)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000800)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000000840)={0x20, 0x1, 0xce, "6fb7e61f9ab440b7bf45321e0258d7232ab140ced1f64948320feeb8762db8e66d6d87c2ae4372c71255922e1e0538b1800ac4de18c08f546a97fecc7729919867a30233b85e8bf42b6a62898fedd4bde747de79b2d29044979ec765d5deb451eb8e08c16a2ce12344e51354e51cf726de9bb9eeea984496e4df429db7949fe9588bd3d3517a6d08c8341d670f048e5ba611e689bc005adfac11859afad463519a1ecad1090906fa00a39dfb1af214bf4040dfe15b66445b70d1ed85c23ca546dcfc6399f4faa871e62a0818711e"}, &(0x7f0000000940)={0x20, 0x3, 0x1, 0x9}}) (async) 20:10:02 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 31) 20:10:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0xe0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:02 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd2720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:02 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x8a600000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:02 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x7a110000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x1f4, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1072.332687][T18640] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1072.352140][T18638] loop0: detected capacity change from 0 to 24 [ 1072.365304][T18638] MTD: Attempt to mount non-MTD device "/dev/loop0" 20:10:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x300, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1072.389027][T18638] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1072.407437][T18640] team380: entered promiscuous mode 20:10:02 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 32) 20:10:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x3e8, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1072.433634][T18640] 8021q: adding VLAN 0 to HW filter on device team380 20:10:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x500, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:02 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 33) [ 1072.481406][T18656] loop0: detected capacity change from 0 to 24 [ 1072.493862][T18656] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1072.512804][T18656] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1072.591811][T18660] loop0: detected capacity change from 0 to 24 [ 1072.608677][T18660] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1072.631676][T18660] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1072.639844][T12659] usb 5-1: new high-speed USB device number 26 using dummy_hcd [ 1072.763261][T18648] gre310: entered promiscuous mode [ 1072.779912][T18648] team380: Port device gre310 added [ 1072.785610][T18649] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1072.812198][T18649] team368: entered promiscuous mode [ 1072.817914][T18649] 8021q: adding VLAN 0 to HW filter on device team368 [ 1072.833723][T18651] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1072.854626][T18651] team376: entered promiscuous mode [ 1072.860551][T18651] 8021q: adding VLAN 0 to HW filter on device team376 [ 1072.987392][T18653] gre301: entered promiscuous mode [ 1072.999481][T18653] team368: Port device gre301 added [ 1073.027503][T12659] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1073.038752][T12659] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1073.049679][T12659] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1073.062221][T12659] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1073.073076][T12659] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1073.086392][T12659] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1073.095978][T12659] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1073.106194][T12659] usb 5-1: config 0 descriptor?? [ 1073.151349][T18655] gre307: entered promiscuous mode [ 1073.163156][T18655] team376: Port device gre307 added [ 1073.618328][T12659] keytouch 0003:0926:3333.006B: fixing up Keytouch IEC report descriptor [ 1073.629040][T12659] keytouch 0003:0926:3333.006B: usb_submit_urb(out) failed: -90 [ 1073.637470][T12659] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.006B/input/input118 [ 1073.730412][T12659] keytouch 0003:0926:3333.006B: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 1073.822800][T18645] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1073.832411][T18645] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1073.841064][T18645] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1073.850736][T18645] misc raw-gadget: fail, usb_gadget_register_driver returned -16 20:10:04 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, &(0x7f00000002c0)={0x24, &(0x7f00000000c0)={0x20, 0x1, 0x94, {0x94, 0x23, "0c27f8e303e364ab9221d9e0d722054bd38562c20d2437193e283c16a4d7c5bc79753ac9f9b9a1ad3518e97fcda1166ba65e6e08b41ec86779a6851a94da60423a79a4689ef840beefcc1109716e83b71a9021af4b514baace1dad025e6d14b877bcac128010eefd3ccba744c40e09073373331e21e81f4473935a64e23bb45808f2bed8608401590dfd4974a184f99c5a49"}}, &(0x7f0000000180)={0x0, 0x3, 0x95, @string={0x95, 0x3, "dfe3265894e092230d13649a15e30903447a2b6eb703ceb2ea6140d166bd9aa8fc88d559a1f2935bdc44789a2ff7bb3be02b666f622ce21cd98b920f0116d33285e596fafbd7a67cf834b1e18336edf33a2983ae2692c0c533c7fa90584459ce8927a0bf60c5a51c82a3e43efdd58df95ab243f6898d06bfe7c0552c4c6313c3d83363ceedd1c191264588abc44eb2651ef387"}}, &(0x7f0000000040)={0x0, 0x22, 0xa, {[@global=@item_4={0x3, 0x1, 0xf86cc90504e0fb14, "01f8f5ad"}, @local=@item_4={0x3, 0x2, 0x1, "8eaf6cc8"}]}}, &(0x7f0000000280)={0x0, 0x21, 0x9, {0x9, 0x21, 0x2, 0x2, 0x1, {0x22, 0xcd7}}}}, &(0x7f0000000500)={0x2c, &(0x7f0000000300)={0x20, 0x31, 0x6a, "28fc32c07020453233433adab2dfbc1d16f0cccbc3548ad065144ef9957d9b90b26f0321c154360d3e0aed74424d4b7e190ac444febd374305fc7d966b9e31f0557a522d002cc4db1457292b0de0d850444bf7573662e123dd5defa6f450d2b4839d4b43a9bd03bfe3e8"}, &(0x7f0000000380)={0x0, 0xa, 0x1, 0x1}, &(0x7f00000003c0)={0x0, 0x8, 0x1, 0x3}, &(0x7f0000000400)={0x20, 0x1, 0x7c, "bc74e0aaa6dacf591bfc30e44dd4fa66fd554758251ef5791af42a2a630f95328f4876048f0b3d7a78a9e551a29ecec969e9d16a69e8f4ee3ad6a82b98935841ac1246a750f60dd0cd60e016319f273796a5c2c4cf86c8e8979ea882ab36714a56d8da3c9f9a95905ffdc24f166305b5de458dd6494500f51cea7daf"}, &(0x7f00000004c0)={0x20, 0x3, 0x1}}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) syz_usb_connect$uac1(0x2, 0xc7, &(0x7f00000009c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0xff, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xb5, 0x3, 0x1, 0x3, 0x60, 0x7d, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0xfff9, 0x2b}, [@input_terminal={0xc, 0x24, 0x2, 0x1, 0x206, 0x4, 0x8, 0x0, 0x76, 0x7f}, @feature_unit={0xd, 0x24, 0x6, 0x1, 0x4, 0x3, [0x5, 0x9, 0x4], 0x1}, @selector_unit={0x8, 0x24, 0x5, 0x5, 0x6, "6f0cbc"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x0, 0xc1, 0x7}, @format_type_i_continuous={0xb, 0x24, 0x2, 0x1, 0x40, 0x3, 0xf8, 0x9, '\'X', "aa"}, @format_type_i_continuous={0xe, 0x24, 0x2, 0x1, 0x3, 0x3, 0x1, 0x37, "2ecb93", "807cc4"}, @format_type_i_continuous={0x9, 0x24, 0x2, 0x1, 0x3, 0x3, 0x2, 0x7, "", "15"}]}, {{0x9, 0x5, 0x1, 0x9, 0x3ff, 0x1, 0x5, 0x7f, {0x7, 0x25, 0x1, 0x80, 0xdf, 0x4}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x0, 0x1, 0x6, 0x7, "8b1e"}]}, {{0x9, 0x5, 0x82, 0x9, 0x8, 0x27, 0x8, 0x0, {0x7, 0x25, 0x1, 0x82, 0x58, 0x5}}}}}}}]}}, &(0x7f0000000ec0)={0xa, &(0x7f0000000ac0)={0xa, 0x6, 0x201, 0x3f, 0x0, 0x3d, 0xff, 0x9}, 0x37, &(0x7f0000000b00)={0x5, 0xf, 0x37, 0x3, [@wireless={0xb, 0x10, 0x1, 0xa, 0x2, 0x2, 0x8, 0x3a, 0x9}, @generic={0x1c, 0x10, 0x3, "11c33bcf35537b9bc864febc9ec3f525f8a3f43ea949bcdb5a"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x1, 0x7f, 0x0, 0xffff}]}, 0x6, [{0x7, &(0x7f0000000b40)=@string={0x7, 0x3, "0db31aa46e"}}, {0x4, &(0x7f0000000b80)=@lang_id={0x4, 0x3, 0x3401}}, {0x4, &(0x7f0000000bc0)=@lang_id={0x4, 0x3, 0x200a}}, {0x5a, &(0x7f0000000c00)=@string={0x5a, 0x3, "0c12f1a59a365c63761c3e0c4a2ecca323d0e5c835d03724fd2b7f784ae36a20dd0ada04c887c133a864af9b3bb4a56f96480f0deee2b9f010db1477366eb4608c91026ffeb05653edacc72f33e6e9a79afc0b7a5f36ccdb"}}, {0x101, &(0x7f0000000c80)=@string={0x101, 0x3, "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"}}, {0xe8, &(0x7f0000000dc0)=@string={0xe8, 0x3, "a838b9fb3ec1ea5755a50928c642aa4fe762de02192817e34a2ecfa068a29411a98173f7959b20eb1a72badbf48f876860945020fbcaec2edb768b96f2f251d253234c866cb5f8c5a5721091d7f8b92d01c4a6a09fa0a158577af77a232d122a1b5088af080ff6a4cabee326d58933f5a3ce6014ddc26905785b420d0f18a753b22dc4b0d1f37b3c78172636de46bab2443fe1c819715f8aa7a6fcc4ad2ea6041b43e921a44ffe072cdb3bcbf49ba807470225772e517c5c5f2d82144d4e172ce36076e6bee69aa91ec60cbffe2ded024450513a7144e6a68b42615670f9d4db346d38970afe"}}]}) (async) r1 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_disconnect(r1) syz_usb_control_io$hid(r1, &(0x7f0000000740)={0x24, &(0x7f0000000540)={0x0, 0x11, 0x2e, {0x2e, 0x5, "ac9a142b7271ce5e4c5cd565f0f844f23901b4ab79f5c9d7dc7ff5969960075ccaa7ab732674b593b0caf0b6"}}, &(0x7f0000000580)={0x0, 0x3, 0xff, @string={0xff, 0x3, "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"}}, &(0x7f00000006c0)={0x0, 0x22, 0x1d, {[@global=@item_4={0x3, 0x1, 0x7, "c4cd9930"}, @local=@item_012={0x0, 0x2, 0x8}, @global=@item_012={0x2, 0x1, 0x5, "53d5"}, @global=@item_4={0x3, 0x1, 0x2, "aef11499"}, @main=@item_012={0x2, 0x0, 0xa, "e719"}, @local=@item_012={0x0, 0x2, 0x3}, @local=@item_4={0x3, 0x2, 0x1, "abd818c5"}, @local=@item_012={0x0, 0x2, 0x9}, @local=@item_4={0x3, 0x2, 0x8, "398edf2f"}]}}, &(0x7f0000000700)={0x0, 0x21, 0x9, {0x9, 0x21, 0x9, 0x8, 0x1, {0x22, 0x4e4}}}}, &(0x7f0000000980)={0x2c, &(0x7f0000000780)={0x20, 0xd, 0x2a, "129f5521b85c7167da784419ef23b753f321e00246d5b493b318234d52e1b600268858014e25c5d5ebd8"}, &(0x7f00000007c0)={0x0, 0xa, 0x1, 0x4}, &(0x7f0000000800)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000000840)={0x20, 0x1, 0xce, "6fb7e61f9ab440b7bf45321e0258d7232ab140ced1f64948320feeb8762db8e66d6d87c2ae4372c71255922e1e0538b1800ac4de18c08f546a97fecc7729919867a30233b85e8bf42b6a62898fedd4bde747de79b2d29044979ec765d5deb451eb8e08c16a2ce12344e51354e51cf726de9bb9eeea984496e4df429db7949fe9588bd3d3517a6d08c8341d670f048e5ba611e689bc005adfac11859afad463519a1ecad1090906fa00a39dfb1af214bf4040dfe15b66445b70d1ed85c23ca546dcfc6399f4faa871e62a0818711e"}, &(0x7f0000000940)={0x20, 0x3, 0x1, 0x9}}) 20:10:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x600, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:04 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 34) 20:10:04 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd3720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:04 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x7c010000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:04 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x8e010000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1074.062243][T18645] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1074.071236][T18645] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1074.084907][ T6580] usb 5-1: USB disconnect, device number 26 20:10:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x700, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1074.162355][T18679] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1074.171477][T18676] FAULT_INJECTION: forcing a failure. [ 1074.171477][T18676] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.209228][T18676] CPU: 0 PID: 18676 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1074.219705][T18676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1074.225989][T18679] team381: entered promiscuous mode [ 1074.229757][T18676] Call Trace: [ 1074.229766][T18676] [ 1074.229774][T18676] dump_stack_lvl+0x125/0x1b0 [ 1074.229802][T18676] should_fail_ex+0x496/0x5b0 [ 1074.229829][T18676] should_failslab+0x9/0x20 [ 1074.229856][T18676] kmem_cache_alloc+0x33a/0x3b0 [ 1074.229879][T18676] ? userfaultfd_unmap_prep+0x4d0/0x4d0 [ 1074.229900][T18676] getname_flags.part.0+0x50/0x4d0 [ 1074.229923][T18676] getname+0x90/0xe0 [ 1074.229943][T18676] do_sys_openat2+0x100/0x1e0 [ 1074.279196][T18676] ? build_open_flags+0x690/0x690 [ 1074.284241][T18676] ? __vm_munmap+0x180/0x390 [ 1074.288840][T18676] ? do_vmi_munmap+0x450/0x450 [ 1074.293612][T18676] __x64_sys_openat+0x175/0x210 [ 1074.298497][T18676] ? __ia32_sys_open+0x1e0/0x1e0 [ 1074.303450][T18676] ? syscall_enter_from_user_mode+0x26/0x80 [ 1074.309359][T18676] do_syscall_64+0x38/0xb0 [ 1074.313782][T18676] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1074.319679][T18676] RIP: 0033:0x7ffba087b6e0 [ 1074.324094][T18676] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44 [ 1074.343876][T18676] RSP: 002b:00007ffba159ae20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 20:10:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0xa00, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1074.352325][T18676] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007ffba087b6e0 [ 1074.360303][T18676] RDX: 0000000000000002 RSI: 00007ffba159af40 RDI: 00000000ffffff9c [ 1074.368283][T18676] RBP: 00007ffba159af40 R08: 0000000000000000 R09: 000000000000015a [ 1074.376280][T18676] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 1074.384267][T18676] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1074.392282][T18676] [ 1074.396494][T18679] 8021q: adding VLAN 0 to HW filter on device team381 20:10:04 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 35) 20:10:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0xe00, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:04 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 36) [ 1074.484444][T18691] loop0: detected capacity change from 0 to 24 [ 1074.499826][T18691] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1074.508992][T18691] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:10:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x1100, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1074.614875][T18695] FAULT_INJECTION: forcing a failure. [ 1074.614875][T18695] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.635450][T18695] CPU: 0 PID: 18695 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1074.645914][T18695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1074.655995][T18695] Call Trace: [ 1074.659284][T18695] [ 1074.662213][T18695] dump_stack_lvl+0x125/0x1b0 [ 1074.666992][T18695] should_fail_ex+0x496/0x5b0 [ 1074.671688][T18695] should_failslab+0x9/0x20 [ 1074.676292][T18695] kmem_cache_alloc+0x33a/0x3b0 [ 1074.681159][T18695] alloc_empty_file+0x73/0x1d0 [ 1074.685924][T18695] path_openat+0xdc/0x29c0 [ 1074.690345][T18695] ? path_lookupat+0x770/0x770 [ 1074.695136][T18695] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1074.701160][T18695] do_filp_open+0x1de/0x430 [ 1074.705670][T18695] ? may_open_dev+0xf0/0xf0 [ 1074.710197][T18695] ? _raw_spin_unlock+0x28/0x40 [ 1074.715059][T18695] ? alloc_fd+0x2da/0x6c0 [ 1074.719399][T18695] do_sys_openat2+0x176/0x1e0 [ 1074.724081][T18695] ? build_open_flags+0x690/0x690 [ 1074.729198][T18695] ? xfd_validate_state+0x5d/0x180 [ 1074.734316][T18695] __x64_sys_openat+0x175/0x210 [ 1074.739167][T18695] ? __ia32_sys_open+0x1e0/0x1e0 [ 1074.744108][T18695] ? syscall_enter_from_user_mode+0x26/0x80 [ 1074.750005][T18695] do_syscall_64+0x38/0xb0 [ 1074.754418][T18695] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1074.760310][T18695] RIP: 0033:0x7ffba087b6e0 [ 1074.764715][T18695] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44 [ 1074.784417][T18695] RSP: 002b:00007ffba159ae20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1074.792821][T18695] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007ffba087b6e0 [ 1074.800789][T18695] RDX: 0000000000000002 RSI: 00007ffba159af40 RDI: 00000000ffffff9c [ 1074.808751][T18695] RBP: 00007ffba159af40 R08: 0000000000000000 R09: 000000000000015a [ 1074.816710][T18695] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 1074.824668][T18695] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1074.832641][T18695] [ 1074.848884][ T6580] usb 5-1: new high-speed USB device number 27 using dummy_hcd [ 1074.894683][T18684] gre311: entered promiscuous mode [ 1074.910317][T18684] team381: Port device gre311 added [ 1074.915919][T18686] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1074.949417][T18686] team369: entered promiscuous mode [ 1074.954771][T18686] 8021q: adding VLAN 0 to HW filter on device team369 [ 1074.973279][T18687] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1074.992355][T18687] team377: entered promiscuous mode [ 1074.997843][T18687] 8021q: adding VLAN 0 to HW filter on device team377 [ 1075.081017][T18680] gre302: entered promiscuous mode [ 1075.090926][T18680] team369: Port device gre302 added [ 1075.183848][T18678] gre308: entered promiscuous mode [ 1075.191705][T18678] team377: Port device gre308 added [ 1075.207489][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1075.230460][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1075.249009][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1075.260618][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1075.270629][ T6580] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1075.283832][ T6580] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1075.293725][ T6580] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1075.303327][ T6580] usb 5-1: config 0 descriptor?? [ 1075.769755][T18698] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1075.778538][T18698] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1075.785012][T18699] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1075.795475][T18699] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1075.828239][ T6580] keytouch 0003:0926:3333.006C: fixing up Keytouch IEC report descriptor [ 1075.841841][ T6580] keytouch 0003:0926:3333.006C: usb_submit_urb(out) failed: -90 [ 1075.850350][ T6580] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.006C/input/input119 [ 1075.932307][ T6580] keytouch 0003:0926:3333.006C: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 1076.029339][ T5117] usb 5-1: USB disconnect, device number 27 20:10:06 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 37) 20:10:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x1400, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:06 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd4720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:06 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x81000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:06 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x90020000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:06 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = socket$inet(0x10, 0x80803, 0x4000000000000004) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f0000000000)={0x14, &(0x7f0000000140)={0x40, 0x2e, 0xb6, {0xb6, 0x6, "d87451ddd9598384eb9a6f64c20bf0c2e851a227a2d9adc86e2a6022981decae742409001c0a818ed53e4f13ca5ac1311e49aee6e04b2d23ca89bafb93d6a44a5e47b1fbed2504802c860353f00c5f23b377b60ee3564a5c58ebe8fd1123ab711b3ff70b8537f0393db78c2d50bb7d65161421c4df9028c2379a89dda8b8d64c689dbebf5bcecb54cfbcc97c20e5b3afb8ba6b776602c3300ee64562e10a6258ba9d5d02efdbdc98b856f481de55e6acd4a8bbf7"}}, &(0x7f0000000200)={0x0, 0x3, 0xeb, @string={0xeb, 0x3, "4ec558e689e1eea4318c07eef2d2ffdb0506a0d357be6f5209af065ba4de009271faff758fe96fb3daa6053613d56605f0b5197b60d6b519624ccd7ba3dbecbea4c6d09cd3a85ebc27d6a44b44323c54b6b0887e343e8e75bd1d4bb5874d56bdf318c24364bdd0d3dffb13dfda0298c68f79a15ad9a0e77f87d3e23ad6953d827ec16aa6076f4638f8ac446aeba2fe2015475106c3d34704f08c10cb9cc8f2c46b4947f93818d0062b6ee5e48200761c798771c186b9edacef2ded445887d492feea817cb875aafecfd469534f9d11882d02b84d0ca5524aa0635d62aa9ff3e42e8da50a679388ba4e"}}}, &(0x7f0000000700)={0x44, &(0x7f00000004c0)={0x0, 0x13, 0x50, "5ae0e47aa2a19046793998fc4baec48a43e7f67c077bab041da0d3f07fdb192a02bd79e800cc1e005ea3f5372239e4c3f52facce2da7609fe9d1f5af193eae56811a5ca2016692f713ba53f823bf5d1e"}, &(0x7f0000000540)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000580)={0x0, 0x8, 0x1, 0x9}, &(0x7f00000005c0)={0x20, 0x81, 0x3, "c89739"}, &(0x7f0000000600)={0x20, 0x82, 0x3, "66e85a"}, &(0x7f0000000640)={0x20, 0x83, 0x2, "d2bc"}, &(0x7f0000000680)={0x20, 0x84, 0x3, "978660"}, &(0x7f00000006c0)={0x20, 0x85, 0x3, "a47642"}}) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) r2 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) r3 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) bind$inet(r3, &(0x7f00000007c0)={0x2, 0x4e21, @local}, 0x10) syz_usb_control_io(r0, &(0x7f0000000040)={0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="5fd1db8d47add40b96c1ca507cc5a56b2b2d5f397dbbf88829dc459fa06b9ca1e0a5562ce5345c3a22d34c83383b8d1f28a2b98233a120ced4b673c5300e8ba41a321b98116b37bf5ac57da104fa0bd0623e1e3e38c697aba8c85a615be43e534e076ea5e1bd003e9056dde266e8184606165b142cc391ccf295aac29c1615d13b932234a5f7677022c942b44b3221", @ANYRES32=r0, @ANYBLOB="b73728ebfd214e41374083fad013aed93ab98abcf4a8831a933c148507da6395840a56d0fc4abd970b2ffca3b992455fd0aea3ed443fc343a5480c70e378f62fd59faa2bbf219b89c47496413ad4edf539d350e359c132f54f68b92c98b9bf488e6f0de8c5f5682e7064ec7bfe37c59f"], 0x0, 0x0, 0x0, 0x0}, 0x0) [ 1076.556752][T18705] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1076.579158][T18707] FAULT_INJECTION: forcing a failure. [ 1076.579158][T18707] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.590755][T18705] team382: entered promiscuous mode 20:10:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x1f00, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1076.600513][T18705] 8021q: adding VLAN 0 to HW filter on device team382 [ 1076.605641][T18707] CPU: 1 PID: 18707 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1076.617689][T18707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1076.627757][T18707] Call Trace: [ 1076.631037][T18707] [ 1076.633961][T18707] dump_stack_lvl+0x125/0x1b0 [ 1076.637679][T18702] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1076.638641][T18707] should_fail_ex+0x496/0x5b0 [ 1076.638729][T18707] should_failslab+0x9/0x20 [ 1076.638756][T18707] kmem_cache_alloc+0x33a/0x3b0 [ 1076.638783][T18707] security_file_alloc+0x41/0x250 [ 1076.638812][T18707] ? kmem_cache_alloc+0x34e/0x3b0 [ 1076.638836][T18707] init_file+0xb9/0x2d0 [ 1076.638855][T18707] alloc_empty_file+0x91/0x1d0 [ 1076.638880][T18707] path_openat+0xdc/0x29c0 [ 1076.638907][T18707] ? path_lookupat+0x770/0x770 [ 1076.666133][T18702] team370: entered promiscuous mode [ 1076.672160][T18707] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1076.672205][T18707] do_filp_open+0x1de/0x430 20:10:07 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x88a8ffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1076.679200][T18702] 8021q: adding VLAN 0 to HW filter on device team370 [ 1076.681083][T18707] ? may_open_dev+0xf0/0xf0 [ 1076.681129][T18707] ? _raw_spin_unlock+0x28/0x40 [ 1076.696705][T18708] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1076.701413][T18707] ? alloc_fd+0x2da/0x6c0 [ 1076.701458][T18707] do_sys_openat2+0x176/0x1e0 [ 1076.701486][T18707] ? build_open_flags+0x690/0x690 [ 1076.701512][T18707] ? __vm_munmap+0x180/0x390 [ 1076.701535][T18707] ? do_vmi_munmap+0x450/0x450 20:10:07 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x9c000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1076.701558][T18707] __x64_sys_openat+0x175/0x210 [ 1076.701583][T18707] ? __ia32_sys_open+0x1e0/0x1e0 [ 1076.764478][T18707] ? syscall_enter_from_user_mode+0x26/0x80 [ 1076.770415][T18707] do_syscall_64+0x38/0xb0 [ 1076.774859][T18707] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1076.780793][T18707] RIP: 0033:0x7ffba087b6e0 [ 1076.785234][T18707] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44 [ 1076.794535][T18719] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1076.804857][T18707] RSP: 002b:00007ffba159ae20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1076.804895][T18707] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007ffba087b6e0 [ 1076.804908][T18707] RDX: 0000000000000002 RSI: 00007ffba159af40 RDI: 00000000ffffff9c [ 1076.804921][T18707] RBP: 00007ffba159af40 R08: 0000000000000000 R09: 000000000000015a [ 1076.804932][T18707] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 20:10:07 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd5720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:07 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 38) 20:10:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x24ab, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1076.804943][T18707] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1076.804967][T18707] [ 1076.883449][T18719] team371: entered promiscuous mode [ 1076.890125][T18719] 8021q: adding VLAN 0 to HW filter on device team371 [ 1076.923458][T18728] FAULT_INJECTION: forcing a failure. [ 1076.923458][T18728] name failslab, interval 1, probability 0, space 0, times 0 [ 1076.936964][T18728] CPU: 1 PID: 18728 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1076.947411][T18728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1076.957493][T18728] Call Trace: [ 1076.960780][T18728] [ 1076.963751][T18728] dump_stack_lvl+0x125/0x1b0 [ 1076.968479][T18728] should_fail_ex+0x496/0x5b0 [ 1076.973176][T18728] should_failslab+0x9/0x20 [ 1076.977700][T18728] kmem_cache_alloc+0x33a/0x3b0 [ 1076.982664][T18728] alloc_empty_file+0x73/0x1d0 [ 1076.987717][T18728] path_openat+0xdc/0x29c0 [ 1076.992156][T18728] ? path_lookupat+0x770/0x770 [ 1076.997024][T18728] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1077.003042][T18728] do_filp_open+0x1de/0x430 [ 1077.007564][T18728] ? may_open_dev+0xf0/0xf0 [ 1077.012097][T18728] ? _raw_spin_unlock+0x28/0x40 [ 1077.016969][T18728] ? alloc_fd+0x2da/0x6c0 [ 1077.021325][T18728] do_sys_openat2+0x176/0x1e0 [ 1077.026028][T18728] ? build_open_flags+0x690/0x690 [ 1077.031087][T18728] ? __vm_munmap+0x180/0x390 [ 1077.035697][T18728] ? do_vmi_munmap+0x450/0x450 [ 1077.040478][T18728] __x64_sys_openat+0x175/0x210 [ 1077.045351][T18728] ? __ia32_sys_open+0x1e0/0x1e0 [ 1077.050317][T18728] ? syscall_enter_from_user_mode+0x26/0x80 [ 1077.056235][T18728] do_syscall_64+0x38/0xb0 [ 1077.060671][T18728] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1077.066588][T18728] RIP: 0033:0x7ffba087b6e0 [ 1077.071019][T18728] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44 [ 1077.090651][T18728] RSP: 002b:00007ffba159ae20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1077.099083][T18728] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007ffba087b6e0 [ 1077.107065][T18728] RDX: 0000000000000002 RSI: 00007ffba159af40 RDI: 00000000ffffff9c [ 1077.115046][T18728] RBP: 00007ffba159af40 R08: 0000000000000000 R09: 000000000000015a 20:10:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x2800, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x3600, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:07 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 39) [ 1077.123042][T18728] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 1077.131068][T18728] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1077.139151][T18728] [ 1077.155552][T12659] usb 5-1: new high-speed USB device number 28 using dummy_hcd [ 1077.155845][T18725] gre303: entered promiscuous mode 20:10:07 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x8a600000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1077.208044][T18735] FAULT_INJECTION: forcing a failure. [ 1077.208044][T18735] name failslab, interval 1, probability 0, space 0, times 0 [ 1077.221016][T18725] team371: Port device gre303 added [ 1077.227494][T18726] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1077.237851][T18735] CPU: 1 PID: 18735 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1077.248345][T18735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1077.258462][T18735] Call Trace: [ 1077.261741][T18735] [ 1077.264670][T18735] dump_stack_lvl+0x125/0x1b0 [ 1077.269438][T18735] should_fail_ex+0x496/0x5b0 [ 1077.274248][T18735] should_failslab+0x9/0x20 [ 1077.278764][T18735] __kmem_cache_alloc_node+0x2fd/0x350 [ 1077.284231][T18735] ? tomoyo_encode2+0x100/0x3d0 [ 1077.290837][T18735] ? tomoyo_encode2+0x100/0x3d0 [ 1077.295695][T18735] __kmalloc+0x4c/0x100 [ 1077.299860][T18735] tomoyo_encode2+0x100/0x3d0 [ 1077.304545][T18735] ? rcu_is_watching+0x12/0xb0 [ 1077.309320][T18735] tomoyo_encode+0x29/0x50 [ 1077.313739][T18735] tomoyo_realpath_from_path+0x196/0x710 [ 1077.319476][T18735] tomoyo_check_open_permission+0x2aa/0x3b0 [ 1077.325723][T18735] ? tomoyo_path_number_perm+0x590/0x590 [ 1077.331365][T18735] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1077.337377][T18735] ? hook_path_mknod+0x670/0x670 [ 1077.342312][T18735] ? reacquire_held_locks+0x4b0/0x4b0 [ 1077.347718][T18735] ? spin_bug+0x1d0/0x1d0 [ 1077.352059][T18735] tomoyo_file_open+0xa8/0xd0 [ 1077.356761][T18735] security_file_open+0x6a/0xe0 [ 1077.361631][T18735] do_dentry_open+0x538/0x1780 [ 1077.366407][T18735] ? may_open+0x1f2/0x400 [ 1077.370738][T18735] path_openat+0x19af/0x29c0 [ 1077.375365][T18735] ? path_lookupat+0x770/0x770 [ 1077.380143][T18735] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1077.386131][T18735] do_filp_open+0x1de/0x430 [ 1077.390633][T18735] ? may_open_dev+0xf0/0xf0 [ 1077.395148][T18735] ? _raw_spin_unlock+0x28/0x40 [ 1077.400085][T18735] ? alloc_fd+0x2da/0x6c0 [ 1077.404455][T18735] do_sys_openat2+0x176/0x1e0 [ 1077.409150][T18735] ? build_open_flags+0x690/0x690 [ 1077.414181][T18735] ? xfd_validate_state+0x5d/0x180 [ 1077.419305][T18735] __x64_sys_openat+0x175/0x210 [ 1077.424155][T18735] ? __ia32_sys_open+0x1e0/0x1e0 [ 1077.429096][T18735] ? syscall_enter_from_user_mode+0x26/0x80 [ 1077.435010][T18735] do_syscall_64+0x38/0xb0 [ 1077.439421][T18735] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1077.445313][T18735] RIP: 0033:0x7ffba087b6e0 [ 1077.449725][T18735] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44 [ 1077.469344][T18735] RSP: 002b:00007ffba159ae20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1077.477864][T18735] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007ffba087b6e0 [ 1077.485839][T18735] RDX: 0000000000000002 RSI: 00007ffba159af40 RDI: 00000000ffffff9c [ 1077.493809][T18735] RBP: 00007ffba159af40 R08: 0000000000000000 R09: 000000000000015a [ 1077.501777][T18735] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 1077.509741][T18735] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1077.517720][T18735] [ 1077.546695][T18726] team383: entered promiscuous mode [ 1077.552238][T18726] 8021q: adding VLAN 0 to HW filter on device team383 20:10:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x4000, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1077.575740][T18724] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1077.589972][T18735] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1077.597753][T18735] loop0: detected capacity change from 0 to 24 [ 1077.604754][T18735] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1077.614948][T18724] team378: entered promiscuous mode [ 1077.620825][T18735] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1077.632489][T18724] 8021q: adding VLAN 0 to HW filter on device team378 [ 1077.767269][T18729] gre309: entered promiscuous mode [ 1077.774099][T18729] team378: Port device gre309 added [ 1077.787690][T12659] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1077.803805][T12659] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1077.819555][T12659] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1077.843436][T12659] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1077.868585][T12659] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1077.887535][T12659] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1077.896641][T12659] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1077.918857][T12659] usb 5-1: config 0 descriptor?? [ 1077.950486][T18722] gre312: entered promiscuous mode [ 1077.959558][T18722] team383: Port device gre312 added [ 1078.116471][T18741] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1078.132576][T18741] team372: entered promiscuous mode [ 1078.138243][T18741] 8021q: adding VLAN 0 to HW filter on device team372 [ 1078.228509][T18744] gre304: entered promiscuous mode [ 1078.245000][T18744] team372: Port device gre304 added [ 1078.747476][T12659] usbhid 5-1:0.0: can't add hid device: -71 [ 1078.753485][T12659] usbhid: probe of 5-1:0.0 failed with error -71 [ 1078.767827][T12659] usb 5-1: USB disconnect, device number 28 20:10:09 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = socket$inet(0x10, 0x80803, 0x4000000000000004) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f0000000000)={0x14, &(0x7f0000000140)={0x40, 0x2e, 0xb6, {0xb6, 0x6, "d87451ddd9598384eb9a6f64c20bf0c2e851a227a2d9adc86e2a6022981decae742409001c0a818ed53e4f13ca5ac1311e49aee6e04b2d23ca89bafb93d6a44a5e47b1fbed2504802c860353f00c5f23b377b60ee3564a5c58ebe8fd1123ab711b3ff70b8537f0393db78c2d50bb7d65161421c4df9028c2379a89dda8b8d64c689dbebf5bcecb54cfbcc97c20e5b3afb8ba6b776602c3300ee64562e10a6258ba9d5d02efdbdc98b856f481de55e6acd4a8bbf7"}}, &(0x7f0000000200)={0x0, 0x3, 0xeb, @string={0xeb, 0x3, "4ec558e689e1eea4318c07eef2d2ffdb0506a0d357be6f5209af065ba4de009271faff758fe96fb3daa6053613d56605f0b5197b60d6b519624ccd7ba3dbecbea4c6d09cd3a85ebc27d6a44b44323c54b6b0887e343e8e75bd1d4bb5874d56bdf318c24364bdd0d3dffb13dfda0298c68f79a15ad9a0e77f87d3e23ad6953d827ec16aa6076f4638f8ac446aeba2fe2015475106c3d34704f08c10cb9cc8f2c46b4947f93818d0062b6ee5e48200761c798771c186b9edacef2ded445887d492feea817cb875aafecfd469534f9d11882d02b84d0ca5524aa0635d62aa9ff3e42e8da50a679388ba4e"}}}, &(0x7f0000000700)={0x44, &(0x7f00000004c0)={0x0, 0x13, 0x50, "5ae0e47aa2a19046793998fc4baec48a43e7f67c077bab041da0d3f07fdb192a02bd79e800cc1e005ea3f5372239e4c3f52facce2da7609fe9d1f5af193eae56811a5ca2016692f713ba53f823bf5d1e"}, &(0x7f0000000540)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000580)={0x0, 0x8, 0x1, 0x9}, &(0x7f00000005c0)={0x20, 0x81, 0x3, "c89739"}, &(0x7f0000000600)={0x20, 0x82, 0x3, "66e85a"}, &(0x7f0000000640)={0x20, 0x83, 0x2, "d2bc"}, &(0x7f0000000680)={0x20, 0x84, 0x3, "978660"}, &(0x7f00000006c0)={0x20, 0x85, 0x3, "a47642"}}) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) r2 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) r3 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) bind$inet(r3, &(0x7f00000007c0)={0x2, 0x4e21, @local}, 0x10) syz_usb_control_io(r0, &(0x7f0000000040)={0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="5fd1db8d47add40b96c1ca507cc5a56b2b2d5f397dbbf88829dc459fa06b9ca1e0a5562ce5345c3a22d34c83383b8d1f28a2b98233a120ced4b673c5300e8ba41a321b98116b37bf5ac57da104fa0bd0623e1e3e38c697aba8c85a615be43e534e076ea5e1bd003e9056dde266e8184606165b142cc391ccf295aac29c1615d13b932234a5f7677022c942b44b3221", @ANYRES32=r0, @ANYBLOB="b73728ebfd214e41374083fad013aed93ab98abcf4a8831a933c148507da6395840a56d0fc4abd970b2ffca3b992455fd0aea3ed443fc343a5480c70e378f62fd59faa2bbf219b89c47496413ad4edf539d350e359c132f54f68b92c98b9bf488e6f0de8c5f5682e7064ec7bfe37c59f"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) (async) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) socket$inet(0x10, 0x80803, 0x4000000000000004) (async) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f0000000000)={0x14, &(0x7f0000000140)={0x40, 0x2e, 0xb6, {0xb6, 0x6, "d87451ddd9598384eb9a6f64c20bf0c2e851a227a2d9adc86e2a6022981decae742409001c0a818ed53e4f13ca5ac1311e49aee6e04b2d23ca89bafb93d6a44a5e47b1fbed2504802c860353f00c5f23b377b60ee3564a5c58ebe8fd1123ab711b3ff70b8537f0393db78c2d50bb7d65161421c4df9028c2379a89dda8b8d64c689dbebf5bcecb54cfbcc97c20e5b3afb8ba6b776602c3300ee64562e10a6258ba9d5d02efdbdc98b856f481de55e6acd4a8bbf7"}}, &(0x7f0000000200)={0x0, 0x3, 0xeb, @string={0xeb, 0x3, "4ec558e689e1eea4318c07eef2d2ffdb0506a0d357be6f5209af065ba4de009271faff758fe96fb3daa6053613d56605f0b5197b60d6b519624ccd7ba3dbecbea4c6d09cd3a85ebc27d6a44b44323c54b6b0887e343e8e75bd1d4bb5874d56bdf318c24364bdd0d3dffb13dfda0298c68f79a15ad9a0e77f87d3e23ad6953d827ec16aa6076f4638f8ac446aeba2fe2015475106c3d34704f08c10cb9cc8f2c46b4947f93818d0062b6ee5e48200761c798771c186b9edacef2ded445887d492feea817cb875aafecfd469534f9d11882d02b84d0ca5524aa0635d62aa9ff3e42e8da50a679388ba4e"}}}, &(0x7f0000000700)={0x44, &(0x7f00000004c0)={0x0, 0x13, 0x50, "5ae0e47aa2a19046793998fc4baec48a43e7f67c077bab041da0d3f07fdb192a02bd79e800cc1e005ea3f5372239e4c3f52facce2da7609fe9d1f5af193eae56811a5ca2016692f713ba53f823bf5d1e"}, &(0x7f0000000540)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000580)={0x0, 0x8, 0x1, 0x9}, &(0x7f00000005c0)={0x20, 0x81, 0x3, "c89739"}, &(0x7f0000000600)={0x20, 0x82, 0x3, "66e85a"}, &(0x7f0000000640)={0x20, 0x83, 0x2, "d2bc"}, &(0x7f0000000680)={0x20, 0x84, 0x3, "978660"}, &(0x7f00000006c0)={0x20, 0x85, 0x3, "a47642"}}) (async) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) (async) socket$inet(0x10, 0x80803, 0x4000000000000004) (async) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) (async) socket$inet(0x10, 0x80803, 0x4000000000000004) (async) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) (async) bind$inet(r3, &(0x7f00000007c0)={0x2, 0x4e21, @local}, 0x10) (async) syz_usb_control_io(r0, &(0x7f0000000040)={0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="5fd1db8d47add40b96c1ca507cc5a56b2b2d5f397dbbf88829dc459fa06b9ca1e0a5562ce5345c3a22d34c83383b8d1f28a2b98233a120ced4b673c5300e8ba41a321b98116b37bf5ac57da104fa0bd0623e1e3e38c697aba8c85a615be43e534e076ea5e1bd003e9056dde266e8184606165b142cc391ccf295aac29c1615d13b932234a5f7677022c942b44b3221", @ANYRES32=r0, @ANYBLOB="b73728ebfd214e41374083fad013aed93ab98abcf4a8831a933c148507da6395840a56d0fc4abd970b2ffca3b992455fd0aea3ed443fc343a5480c70e378f62fd59faa2bbf219b89c47496413ad4edf539d350e359c132f54f68b92c98b9bf488e6f0de8c5f5682e7064ec7bfe37c59f"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) 20:10:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x6000, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:09 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 40) 20:10:09 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd6720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:09 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x9c010000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:09 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x9effffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1079.205834][T18750] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1079.208897][T18749] FAULT_INJECTION: forcing a failure. [ 1079.208897][T18749] name failslab, interval 1, probability 0, space 0, times 0 [ 1079.229924][T18750] team379: entered promiscuous mode [ 1079.236401][T18750] 8021q: adding VLAN 0 to HW filter on device team379 [ 1079.262965][T18749] CPU: 0 PID: 18749 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1079.272601][T18753] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1079.273384][T18749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1079.273398][T18749] Call Trace: [ 1079.273405][T18749] [ 1079.273413][T18749] dump_stack_lvl+0x125/0x1b0 [ 1079.292792][T18753] team384: entered promiscuous mode [ 1079.295981][T18749] should_fail_ex+0x496/0x5b0 [ 1079.296018][T18749] should_failslab+0x9/0x20 [ 1079.299222][T18753] 8021q: adding VLAN 0 to HW filter on device team384 [ 1079.303588][T18749] __kmem_cache_alloc_node+0x2fd/0x350 [ 1079.303623][T18749] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1079.303661][T18749] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1079.303693][T18749] __kmalloc+0x4c/0x100 [ 1079.303723][T18749] tomoyo_realpath_from_path+0xb9/0x710 [ 1079.303760][T18749] ? tomoyo_profile+0x47/0x60 [ 1079.303791][T18749] tomoyo_path_number_perm+0x243/0x590 [ 1079.303821][T18749] ? tomoyo_path_number_perm+0x1eb/0x590 [ 1079.303858][T18749] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1079.303918][T18749] ? reacquire_held_locks+0x4b0/0x4b0 [ 1079.303951][T18749] ? build_open_flags+0x690/0x690 [ 1079.303983][T18749] ? __vm_munmap+0x180/0x390 [ 1079.304013][T18749] ? __fget_files+0x279/0x410 [ 1079.304051][T18749] security_file_ioctl+0x72/0xb0 [ 1079.327402][T18758] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1079.330532][T18749] __x64_sys_ioctl+0xbb/0x210 [ 1079.330567][T18749] do_syscall_64+0x38/0xb0 [ 1079.348701][T18758] team373: entered promiscuous mode [ 1079.351618][T18749] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1079.351646][T18749] RIP: 0033:0x7ffba087c84b [ 1079.351663][T18749] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 1079.356594][T18758] 8021q: adding VLAN 0 to HW filter on device team373 [ 1079.361761][T18749] RSP: 002b:00007ffba159ae40 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1079.361790][T18749] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007ffba087c84b [ 1079.361810][T18749] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1079.361827][T18749] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1079.361845][T18749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1079.498256][T18749] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1079.506270][T18749] 20:10:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0xab24, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1079.517679][T18749] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1079.524806][T18749] loop0: detected capacity change from 0 to 24 [ 1079.536871][T18757] gre310: entered promiscuous mode [ 1079.537821][T18749] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1079.551015][T18749] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:10:09 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 41) [ 1079.567597][T18757] team379: Port device gre310 added 20:10:10 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x9effffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0xe000, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1079.657679][ T5045] usb 5-1: new high-speed USB device number 29 using dummy_hcd [ 1079.685950][T18766] FAULT_INJECTION: forcing a failure. [ 1079.685950][T18766] name failslab, interval 1, probability 0, space 0, times 0 [ 1079.718393][T18766] CPU: 1 PID: 18766 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1079.728894][T18766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1079.738968][T18766] Call Trace: [ 1079.742248][T18766] [ 1079.745179][T18766] dump_stack_lvl+0x125/0x1b0 [ 1079.749870][T18766] should_fail_ex+0x496/0x5b0 [ 1079.754563][T18766] should_failslab+0x9/0x20 [ 1079.759072][T18766] __kmem_cache_alloc_node+0x2fd/0x350 [ 1079.764539][T18766] ? tomoyo_encode2+0x100/0x3d0 [ 1079.769404][T18766] ? tomoyo_encode2+0x100/0x3d0 [ 1079.774266][T18766] __kmalloc+0x4c/0x100 [ 1079.778427][T18766] tomoyo_encode2+0x100/0x3d0 [ 1079.783106][T18766] ? rcu_is_watching+0x12/0xb0 [ 1079.787881][T18766] tomoyo_encode+0x29/0x50 [ 1079.792302][T18766] tomoyo_realpath_from_path+0x196/0x710 [ 1079.797938][T18766] tomoyo_path_number_perm+0x243/0x590 [ 1079.803399][T18766] ? tomoyo_path_number_perm+0x1eb/0x590 [ 1079.809034][T18766] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1079.814847][T18766] ? __might_fault+0xe5/0x190 [ 1079.819534][T18766] ? reacquire_held_locks+0x4b0/0x4b0 [ 1079.824990][T18766] ? rcu_is_watching+0x12/0xb0 [ 1079.829756][T18766] ? xfd_validate_state+0x5d/0x180 [ 1079.834876][T18766] ? __fget_files+0x279/0x410 [ 1079.839556][T18766] security_file_ioctl+0x72/0xb0 [ 1079.844492][T18766] __x64_sys_ioctl+0xbb/0x210 [ 1079.849170][T18766] do_syscall_64+0x38/0xb0 [ 1079.853590][T18766] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1079.859475][T18766] RIP: 0033:0x7ffba087c84b [ 1079.863879][T18766] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 1079.883567][T18766] RSP: 002b:00007ffba159ae40 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1079.892064][T18766] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007ffba087c84b [ 1079.900032][T18766] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1079.907990][T18766] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a 20:10:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0xe5ff, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0xe803, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1079.915951][T18766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1079.923916][T18766] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1079.931919][T18766] [ 1080.017419][T18766] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1080.025039][T18766] loop0: detected capacity change from 0 to 24 [ 1080.033718][T18752] gre305: entered promiscuous mode [ 1080.040958][T18766] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1080.042923][T18752] team373: Port device gre305 added [ 1080.063442][T18766] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1080.177576][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1080.193145][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1080.203639][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1080.210390][T18753] gre313: entered promiscuous mode [ 1080.214914][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1080.228417][T18753] team384: Port device gre313 added [ 1080.232141][ T5045] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1080.249618][ T5045] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1080.268902][ T5045] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1080.286441][ T5045] usb 5-1: config 0 descriptor?? [ 1080.396767][T18768] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1080.412078][T18768] team380: entered promiscuous mode [ 1080.418098][T18768] 8021q: adding VLAN 0 to HW filter on device team380 [ 1080.515541][T18773] gre311: entered promiscuous mode [ 1080.526996][T18773] team380: Port device gre311 added 20:10:11 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) r1 = socket$inet(0x10, 0x80803, 0x4000000000000004) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f0000000000)={0x14, &(0x7f0000000140)={0x40, 0x2e, 0xb6, {0xb6, 0x6, "d87451ddd9598384eb9a6f64c20bf0c2e851a227a2d9adc86e2a6022981decae742409001c0a818ed53e4f13ca5ac1311e49aee6e04b2d23ca89bafb93d6a44a5e47b1fbed2504802c860353f00c5f23b377b60ee3564a5c58ebe8fd1123ab711b3ff70b8537f0393db78c2d50bb7d65161421c4df9028c2379a89dda8b8d64c689dbebf5bcecb54cfbcc97c20e5b3afb8ba6b776602c3300ee64562e10a6258ba9d5d02efdbdc98b856f481de55e6acd4a8bbf7"}}, &(0x7f0000000200)={0x0, 0x3, 0xeb, @string={0xeb, 0x3, "4ec558e689e1eea4318c07eef2d2ffdb0506a0d357be6f5209af065ba4de009271faff758fe96fb3daa6053613d56605f0b5197b60d6b519624ccd7ba3dbecbea4c6d09cd3a85ebc27d6a44b44323c54b6b0887e343e8e75bd1d4bb5874d56bdf318c24364bdd0d3dffb13dfda0298c68f79a15ad9a0e77f87d3e23ad6953d827ec16aa6076f4638f8ac446aeba2fe2015475106c3d34704f08c10cb9cc8f2c46b4947f93818d0062b6ee5e48200761c798771c186b9edacef2ded445887d492feea817cb875aafecfd469534f9d11882d02b84d0ca5524aa0635d62aa9ff3e42e8da50a679388ba4e"}}}, &(0x7f0000000700)={0x44, &(0x7f00000004c0)={0x0, 0x13, 0x50, "5ae0e47aa2a19046793998fc4baec48a43e7f67c077bab041da0d3f07fdb192a02bd79e800cc1e005ea3f5372239e4c3f52facce2da7609fe9d1f5af193eae56811a5ca2016692f713ba53f823bf5d1e"}, &(0x7f0000000540)={0x0, 0xa, 0x1, 0x6}, &(0x7f0000000580)={0x0, 0x8, 0x1, 0x9}, &(0x7f00000005c0)={0x20, 0x81, 0x3, "c89739"}, &(0x7f0000000600)={0x20, 0x82, 0x3, "66e85a"}, &(0x7f0000000640)={0x20, 0x83, 0x2, "d2bc"}, &(0x7f0000000680)={0x20, 0x84, 0x3, "978660"}, &(0x7f00000006c0)={0x20, 0x85, 0x3, "a47642"}}) (async) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) (async) r2 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) (async) r3 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) (async) bind$inet(r3, &(0x7f00000007c0)={0x2, 0x4e21, @local}, 0x10) (async) syz_usb_control_io(r0, &(0x7f0000000040)={0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="5fd1db8d47add40b96c1ca507cc5a56b2b2d5f397dbbf88829dc459fa06b9ca1e0a5562ce5345c3a22d34c83383b8d1f28a2b98233a120ced4b673c5300e8ba41a321b98116b37bf5ac57da104fa0bd0623e1e3e38c697aba8c85a615be43e534e076ea5e1bd003e9056dde266e8184606165b142cc391ccf295aac29c1615d13b932234a5f7677022c942b44b3221", @ANYRES32=r0, @ANYBLOB="b73728ebfd214e41374083fad013aed93ab98abcf4a8831a933c148507da6395840a56d0fc4abd970b2ffca3b992455fd0aea3ed443fc343a5480c70e378f62fd59faa2bbf219b89c47496413ad4edf539d350e359c132f54f68b92c98b9bf488e6f0de8c5f5682e7064ec7bfe37c59f"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0xf401, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:11 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xa54f60f6, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:11 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 42) 20:10:11 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd7720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:11 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xaa020000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1081.013370][T18756] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1081.023125][T18756] misc raw-gadget: fail, usb_gadget_register_driver returned -16 20:10:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0xffe5, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1081.064626][T18784] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1081.085916][T18790] FAULT_INJECTION: forcing a failure. [ 1081.085916][T18790] name failslab, interval 1, probability 0, space 0, times 0 [ 1081.106277][T18784] team381: entered promiscuous mode [ 1081.112051][T18784] 8021q: adding VLAN 0 to HW filter on device team381 [ 1081.116392][ T5045] usbhid 5-1:0.0: can't add hid device: -71 [ 1081.133640][ T5045] usbhid: probe of 5-1:0.0 failed with error -71 [ 1081.140753][T18790] CPU: 0 PID: 18790 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1081.151197][T18790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1081.161264][T18790] Call Trace: [ 1081.164633][T18790] [ 1081.167565][T18790] dump_stack_lvl+0x125/0x1b0 [ 1081.172337][T18790] should_fail_ex+0x496/0x5b0 [ 1081.177028][T18790] should_failslab+0x9/0x20 [ 1081.181564][T18790] kmem_cache_alloc+0x33a/0x3b0 [ 1081.186438][T18790] __kernfs_new_node+0xd3/0x8a0 [ 1081.191304][T18790] ? kernfs_path_from_node+0x60/0x60 [ 1081.196600][T18790] ? lock_sync+0x190/0x190 [ 1081.201126][T18790] ? lock_acquire+0x1ae/0x510 [ 1081.205812][T18790] ? shmem_statfs+0x1b7/0x3e0 [ 1081.210495][T18790] kernfs_create_dir_ns+0x9a/0x210 [ 1081.215632][T18790] internal_create_group+0x780/0xb40 [ 1081.220932][T18790] ? sysfs_remove_group+0x170/0x170 [ 1081.226164][T18790] loop_configure+0xc5e/0x18c0 [ 1081.230949][T18790] lo_ioctl+0x745/0x1a50 [ 1081.235451][T18790] ? mark_held_locks+0x9f/0xe0 [ 1081.240223][T18790] ? kasan_quarantine_put+0x102/0x230 [ 1081.245603][T18790] ? loop_configure+0x18c0/0x18c0 [ 1081.250647][T18790] ? tomoyo_path_number_perm+0x273/0x590 [ 1081.256372][T18790] ? reacquire_held_locks+0x4b0/0x4b0 [ 1081.261776][T18790] ? tomoyo_path_number_perm+0x46e/0x590 [ 1081.267518][T18790] ? __kmem_cache_free+0xb8/0x2f0 [ 1081.272637][T18790] ? tomoyo_path_number_perm+0x190/0x590 [ 1081.278311][T18790] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1081.284148][T18790] ? reacquire_held_locks+0x4b0/0x4b0 [ 1081.289528][T18790] ? build_open_flags+0x690/0x690 [ 1081.294574][T18790] ? __vm_munmap+0x180/0x390 [ 1081.299176][T18790] ? loop_configure+0x18c0/0x18c0 [ 1081.304217][T18790] blkdev_ioctl+0x2f9/0x770 [ 1081.308760][T18790] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1081.314236][T18790] ? bpf_lsm_file_ioctl+0x9/0x10 [ 1081.319214][T18790] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1081.324678][T18790] __x64_sys_ioctl+0x18f/0x210 [ 1081.329454][T18790] do_syscall_64+0x38/0xb0 [ 1081.333964][T18790] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1081.339883][T18790] RIP: 0033:0x7ffba087c84b [ 1081.344330][T18790] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 1081.363981][T18790] RSP: 002b:00007ffba159ae40 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1081.372448][T18790] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007ffba087c84b [ 1081.380436][T18790] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1081.388527][T18790] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1081.396586][T18790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1081.404660][T18790] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1081.412675][T18790] 20:10:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1081.421069][T18785] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1081.448298][ T5045] usb 5-1: USB disconnect, device number 29 [ 1081.452819][T18785] team374: entered promiscuous mode [ 1081.460060][T18785] 8021q: adding VLAN 0 to HW filter on device team374 [ 1081.481848][T18790] loop0: detected capacity change from 0 to 24 [ 1081.493879][T18794] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1081.495982][T18790] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1081.522378][T18794] team385: entered promiscuous mode 20:10:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:11 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 43) [ 1081.533460][T18794] 8021q: adding VLAN 0 to HW filter on device team385 [ 1081.534635][T18790] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:10:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x3, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1081.642553][T18805] FAULT_INJECTION: forcing a failure. [ 1081.642553][T18805] name failslab, interval 1, probability 0, space 0, times 0 [ 1081.666325][T18805] CPU: 0 PID: 18805 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1081.676838][T18805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1081.686915][T18805] Call Trace: [ 1081.690299][T18805] [ 1081.693233][T18805] dump_stack_lvl+0x125/0x1b0 [ 1081.697922][T18805] should_fail_ex+0x496/0x5b0 [ 1081.702618][T18805] should_failslab+0x9/0x20 [ 1081.707142][T18805] kmem_cache_alloc+0x33a/0x3b0 [ 1081.712129][T18805] __kernfs_new_node+0xd3/0x8a0 [ 1081.716999][T18805] ? kernfs_path_from_node+0x60/0x60 [ 1081.722315][T18805] ? lock_sync+0x190/0x190 [ 1081.726757][T18805] ? lock_acquire+0x1ae/0x510 [ 1081.731449][T18805] ? shmem_statfs+0x1b7/0x3e0 [ 1081.736139][T18805] kernfs_create_dir_ns+0x9a/0x210 [ 1081.741284][T18805] internal_create_group+0x780/0xb40 [ 1081.746589][T18805] ? sysfs_remove_group+0x170/0x170 [ 1081.751798][T18805] loop_configure+0xc5e/0x18c0 [ 1081.756585][T18805] lo_ioctl+0x745/0x1a50 [ 1081.760842][T18805] ? mark_held_locks+0x9f/0xe0 [ 1081.765651][T18805] ? kasan_quarantine_put+0x102/0x230 [ 1081.771039][T18805] ? loop_configure+0x18c0/0x18c0 [ 1081.776092][T18805] ? tomoyo_path_number_perm+0x273/0x590 [ 1081.781751][T18805] ? reacquire_held_locks+0x4b0/0x4b0 [ 1081.787031][T18795] gre306: entered promiscuous mode [ 1081.792226][T18805] ? tomoyo_path_number_perm+0x46e/0x590 [ 1081.792264][T18805] ? __kmem_cache_free+0xb8/0x2f0 [ 1081.792295][T18805] ? tomoyo_path_number_perm+0x190/0x590 [ 1081.792323][T18805] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1081.792376][T18805] ? reacquire_held_locks+0x4b0/0x4b0 [ 1081.792406][T18805] ? build_open_flags+0x690/0x690 [ 1081.792443][T18805] ? loop_configure+0x18c0/0x18c0 [ 1081.792483][T18805] blkdev_ioctl+0x2f9/0x770 [ 1081.792514][T18805] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1081.792539][T18805] ? bpf_lsm_file_ioctl+0x9/0x10 [ 1081.792556][T18805] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1081.792578][T18805] __x64_sys_ioctl+0x18f/0x210 [ 1081.792601][T18805] do_syscall_64+0x38/0xb0 [ 1081.792619][T18805] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1081.792638][T18805] RIP: 0033:0x7ffba087c84b [ 1081.792652][T18805] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 1081.792668][T18805] RSP: 002b:00007ffba159ae40 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1081.792684][T18805] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007ffba087c84b [ 1081.827531][T18795] team374: Port device gre306 added [ 1081.831246][T18805] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1081.831262][T18805] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1081.831273][T18805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1081.831285][T18805] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 20:10:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x4, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1081.944275][T18805] [ 1081.967633][T18805] loop0: detected capacity change from 0 to 24 [ 1082.007041][T18805] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1082.014903][T18805] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1082.073971][T18789] gre314: entered promiscuous mode [ 1082.082124][T18789] team385: Port device gre314 added [ 1082.121262][ T5045] usb 5-1: new high-speed USB device number 30 using dummy_hcd [ 1082.183941][T18784] gre312: entered promiscuous mode [ 1082.191225][T18784] team381: Port device gre312 added [ 1082.497512][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1082.510499][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1082.521017][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1082.532115][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1082.541887][ T5045] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1082.554923][ T5045] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1082.564181][ T5045] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1082.573993][ T5045] usb 5-1: config 0 descriptor?? 20:10:13 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:13 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xc3ffffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x5, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:13 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 44) 20:10:13 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd8720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:13 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xb2010000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1082.877756][T18814] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1082.903088][T18818] FAULT_INJECTION: forcing a failure. [ 1082.903088][T18818] name failslab, interval 1, probability 0, space 0, times 0 [ 1082.912287][T18814] team375: entered promiscuous mode 20:10:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x6, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1082.926452][T18814] 8021q: adding VLAN 0 to HW filter on device team375 [ 1082.954023][T18818] CPU: 0 PID: 18818 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1082.964594][T18818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1082.966604][T18824] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1082.974649][T18818] Call Trace: [ 1082.974669][T18818] [ 1082.974677][T18818] dump_stack_lvl+0x125/0x1b0 [ 1082.974708][T18818] should_fail_ex+0x496/0x5b0 [ 1082.995303][T18824] team382: entered promiscuous mode [ 1082.999465][T18818] should_failslab+0x9/0x20 [ 1082.999500][T18818] kmem_cache_alloc+0x33a/0x3b0 [ 1082.999528][T18818] __kernfs_new_node+0xd3/0x8a0 [ 1083.007139][T18824] 8021q: adding VLAN 0 to HW filter on device team382 [ 1083.009207][T18818] ? kernfs_add_one+0x3ca/0x510 [ 1083.009242][T18818] ? kernfs_path_from_node+0x60/0x60 [ 1083.009265][T18818] ? find_held_lock+0x2d/0x110 [ 1083.009298][T18818] ? up_write+0x1b3/0x510 [ 1083.009322][T18818] kernfs_new_node+0x94/0x110 [ 1083.009348][T18818] __kernfs_create_file+0x53/0x340 [ 1083.009379][T18818] sysfs_add_file_mode_ns+0x1ff/0x3b0 [ 1083.009422][T18818] internal_create_group+0x31c/0xb40 [ 1083.009444][T18818] ? sysfs_remove_group+0x170/0x170 [ 1083.009470][T18818] loop_configure+0xc5e/0x18c0 [ 1083.009506][T18818] lo_ioctl+0x745/0x1a50 [ 1083.009532][T18818] ? mark_held_locks+0x9f/0xe0 [ 1083.009558][T18818] ? kasan_quarantine_put+0x102/0x230 [ 1083.009577][T18818] ? loop_configure+0x18c0/0x18c0 [ 1083.061971][T18825] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1083.065672][T18818] ? tomoyo_path_number_perm+0x273/0x590 [ 1083.084429][T18825] team386: entered promiscuous mode [ 1083.084617][T18818] ? reacquire_held_locks+0x4b0/0x4b0 [ 1083.091042][T18825] 8021q: adding VLAN 0 to HW filter on device team386 [ 1083.095001][T18818] ? tomoyo_path_number_perm+0x46e/0x590 [ 1083.095042][T18818] ? __kmem_cache_free+0xb8/0x2f0 [ 1083.137946][T18818] ? tomoyo_path_number_perm+0x190/0x590 [ 1083.143602][T18818] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1083.149438][T18818] ? reacquire_held_locks+0x4b0/0x4b0 [ 1083.154826][T18818] ? build_open_flags+0x690/0x690 [ 1083.159861][T18818] ? __vm_munmap+0x180/0x390 [ 1083.164458][T18818] ? loop_configure+0x18c0/0x18c0 [ 1083.169498][T18818] blkdev_ioctl+0x2f9/0x770 [ 1083.174024][T18818] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1083.179498][T18818] ? bpf_lsm_file_ioctl+0x9/0x10 [ 1083.184443][T18818] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1083.189916][T18818] __x64_sys_ioctl+0x18f/0x210 [ 1083.194694][T18818] do_syscall_64+0x38/0xb0 [ 1083.199404][T18818] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1083.205308][T18818] RIP: 0033:0x7ffba087c84b [ 1083.209750][T18818] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 1083.223193][T18820] gre315: entered promiscuous mode [ 1083.229344][T18818] RSP: 002b:00007ffba159ae40 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1083.229376][T18818] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007ffba087c84b [ 1083.229391][T18818] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1083.229405][T18818] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1083.229418][T18818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1083.229432][T18818] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1083.229462][T18818] [ 1083.230544][ T5045] usbhid 5-1:0.0: can't add hid device: -71 [ 1083.242587][T18820] team386: Port device gre315 added [ 1083.298401][ T5045] usbhid: probe of 5-1:0.0 failed with error -71 20:10:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x7, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1083.302029][ T5045] usb 5-1: USB disconnect, device number 30 [ 1083.304900][T18818] loop0: detected capacity change from 0 to 24 [ 1083.320659][T18818] MTD: Attempt to mount non-MTD device "/dev/loop0" 20:10:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x8, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1083.364729][T18818] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:10:13 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 45) 20:10:13 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd9720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xa, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1083.542996][T18835] FAULT_INJECTION: forcing a failure. [ 1083.542996][T18835] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.560576][T18835] CPU: 0 PID: 18835 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1083.571037][T18835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1083.578321][T18819] gre313: entered promiscuous mode [ 1083.581128][T18835] Call Trace: [ 1083.581138][T18835] [ 1083.581145][T18835] dump_stack_lvl+0x125/0x1b0 [ 1083.581177][T18835] should_fail_ex+0x496/0x5b0 [ 1083.581210][T18835] should_failslab+0x9/0x20 [ 1083.581240][T18835] kmem_cache_alloc+0x33a/0x3b0 [ 1083.581262][T18835] ? find_held_lock+0x2d/0x110 [ 1083.581290][T18835] __kernfs_new_node+0xd3/0x8a0 [ 1083.581314][T18835] ? kernfs_path_from_node+0x60/0x60 [ 1083.581333][T18835] ? find_held_lock+0x2d/0x110 [ 1083.581353][T18835] ? kernfs_add_one+0x3ca/0x510 [ 1083.581374][T18835] ? reacquire_held_locks+0x4b0/0x4b0 [ 1083.581394][T18835] ? __kernfs_new_node+0x54e/0x8a0 [ 1083.581422][T18835] kernfs_new_node+0x94/0x110 [ 1083.588788][T18819] team382: Port device gre313 added [ 1083.590575][T18835] __kernfs_create_file+0x53/0x340 [ 1083.662303][T18835] sysfs_add_file_mode_ns+0x1ff/0x3b0 [ 1083.667723][T18835] internal_create_group+0x31c/0xb40 [ 1083.673033][T18835] ? sysfs_remove_group+0x170/0x170 [ 1083.678330][T18835] loop_configure+0xc5e/0x18c0 [ 1083.683126][T18835] lo_ioctl+0x745/0x1a50 [ 1083.687380][T18835] ? mark_held_locks+0x9f/0xe0 [ 1083.692159][T18835] ? kasan_quarantine_put+0x102/0x230 [ 1083.697565][T18835] ? loop_configure+0x18c0/0x18c0 [ 1083.702598][T18835] ? tomoyo_path_number_perm+0x273/0x590 [ 1083.708274][T18835] ? reacquire_held_locks+0x4b0/0x4b0 [ 1083.713654][T18835] ? tomoyo_path_number_perm+0x46e/0x590 [ 1083.719291][T18835] ? __kmem_cache_free+0xb8/0x2f0 [ 1083.724327][T18835] ? tomoyo_path_number_perm+0x190/0x590 [ 1083.729976][T18835] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1083.735809][T18835] ? reacquire_held_locks+0x4b0/0x4b0 [ 1083.741186][T18835] ? build_open_flags+0x690/0x690 [ 1083.746215][T18835] ? __vm_munmap+0x180/0x390 [ 1083.750802][T18835] ? loop_configure+0x18c0/0x18c0 [ 1083.755849][T18835] blkdev_ioctl+0x2f9/0x770 [ 1083.760364][T18835] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1083.765839][T18835] ? bpf_lsm_file_ioctl+0x9/0x10 [ 1083.770797][T18835] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1083.776262][T18835] __x64_sys_ioctl+0x18f/0x210 [ 1083.781044][T18835] do_syscall_64+0x38/0xb0 [ 1083.785550][T18835] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1083.791447][T18835] RIP: 0033:0x7ffba087c84b [ 1083.795857][T18835] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 1083.815561][T18835] RSP: 002b:00007ffba159ae40 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1083.823987][T18835] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007ffba087c84b [ 1083.831986][T18835] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1083.839959][T18835] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1083.848015][T18835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1083.855982][T18835] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1083.864054][T18835] [ 1083.878200][T18835] loop0: detected capacity change from 0 to 24 [ 1083.885243][T18835] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1083.915216][T18835] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1083.992511][T18814] gre307: entered promiscuous mode [ 1084.002876][T18814] team375: Port device gre307 added [ 1084.037533][ T5045] usb 5-1: new high-speed USB device number 31 using dummy_hcd [ 1084.186843][T18839] team387: entered promiscuous mode [ 1084.192932][T18839] 8021q: adding VLAN 0 to HW filter on device team387 [ 1084.310106][T18840] gre316: entered promiscuous mode [ 1084.333082][T18840] team387: Port device gre316 added [ 1084.417576][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1084.431839][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1084.442152][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1084.453121][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1084.462956][ T5045] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1084.475996][ T5045] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1084.485109][ T5045] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1084.494945][ T5045] usb 5-1: config 0 descriptor?? [ 1085.237589][ T5045] usbhid 5-1:0.0: can't add hid device: -71 [ 1085.245590][ T5045] usbhid: probe of 5-1:0.0 failed with error -71 [ 1085.254950][ T5045] usb 5-1: USB disconnect, device number 31 20:10:16 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xe, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:16 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xba000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:16 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xc4050000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:16 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 46) 20:10:16 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xda720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x11, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1085.718839][T18848] __nla_validate_parse: 1 callbacks suppressed [ 1085.718854][T18848] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1085.722370][T18847] FAULT_INJECTION: forcing a failure. [ 1085.722370][T18847] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.736022][T18848] team388: entered promiscuous mode [ 1085.762002][T18848] 8021q: adding VLAN 0 to HW filter on device team388 [ 1085.786723][T18847] CPU: 0 PID: 18847 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1085.793234][T18852] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1085.797251][T18847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1085.816513][T18847] Call Trace: [ 1085.819807][T18847] [ 1085.822749][T18847] dump_stack_lvl+0x125/0x1b0 [ 1085.827447][T18847] should_fail_ex+0x496/0x5b0 [ 1085.832146][T18847] should_failslab+0x9/0x20 20:10:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x14, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1085.836671][T18847] kmem_cache_alloc+0x33a/0x3b0 [ 1085.841534][T18847] ? find_held_lock+0x2d/0x110 [ 1085.846330][T18847] __kernfs_new_node+0xd3/0x8a0 [ 1085.851211][T18847] ? kernfs_path_from_node+0x60/0x60 [ 1085.856611][T18847] ? find_held_lock+0x2d/0x110 [ 1085.861421][T18847] ? kernfs_add_one+0x3ca/0x510 [ 1085.865232][T18852] team376: entered promiscuous mode [ 1085.866372][T18847] ? reacquire_held_locks+0x4b0/0x4b0 [ 1085.866413][T18847] ? __kernfs_new_node+0x54e/0x8a0 [ 1085.876761][T18852] 8021q: adding VLAN 0 to HW filter on device team376 [ 1085.877902][T18847] kernfs_new_node+0x94/0x110 [ 1085.877943][T18847] __kernfs_create_file+0x53/0x340 [ 1085.877975][T18847] sysfs_add_file_mode_ns+0x1ff/0x3b0 [ 1085.905022][T18847] internal_create_group+0x31c/0xb40 [ 1085.910349][T18847] ? sysfs_remove_group+0x170/0x170 [ 1085.915569][T18847] loop_configure+0xc5e/0x18c0 [ 1085.920349][T18847] lo_ioctl+0x745/0x1a50 [ 1085.924628][T18847] ? mark_held_locks+0x9f/0xe0 [ 1085.929419][T18847] ? kasan_quarantine_put+0x102/0x230 [ 1085.934821][T18847] ? loop_configure+0x18c0/0x18c0 [ 1085.939908][T18847] ? tomoyo_path_number_perm+0x273/0x590 [ 1085.945586][T18847] ? reacquire_held_locks+0x4b0/0x4b0 [ 1085.950971][T18847] ? tomoyo_path_number_perm+0x46e/0x590 [ 1085.956627][T18847] ? __kmem_cache_free+0xb8/0x2f0 [ 1085.961683][T18847] ? tomoyo_path_number_perm+0x190/0x590 [ 1085.967331][T18847] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1085.973182][T18847] ? reacquire_held_locks+0x4b0/0x4b0 [ 1085.977430][T18854] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1085.978546][T18847] ? build_open_flags+0x690/0x690 [ 1085.978589][T18847] ? loop_configure+0x18c0/0x18c0 [ 1085.997905][T18847] blkdev_ioctl+0x2f9/0x770 [ 1086.002454][T18847] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1086.007953][T18847] ? bpf_lsm_file_ioctl+0x9/0x10 [ 1086.012915][T18847] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1086.013745][T18854] team383: entered promiscuous mode [ 1086.018403][T18847] __x64_sys_ioctl+0x18f/0x210 [ 1086.018442][T18847] do_syscall_64+0x38/0xb0 [ 1086.018464][T18847] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1086.018485][T18847] RIP: 0033:0x7ffba087c84b [ 1086.018501][T18847] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 1086.018520][T18847] RSP: 002b:00007ffba159ae40 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1086.018540][T18847] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007ffba087c84b [ 1086.018553][T18847] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1086.018565][T18847] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1086.018577][T18847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1086.018589][T18847] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1086.018610][T18847] [ 1086.033466][T18847] loop0: detected capacity change from 0 to 24 [ 1086.072808][T18854] 8021q: adding VLAN 0 to HW filter on device team383 [ 1086.083337][T18847] MTD: Attempt to mount non-MTD device "/dev/loop0" 20:10:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x28, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:16 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 47) [ 1086.093357][T17997] usb 5-1: new high-speed USB device number 32 using dummy_hcd [ 1086.139156][T18847] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:10:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x36, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x60, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1086.233766][T18864] FAULT_INJECTION: forcing a failure. [ 1086.233766][T18864] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.262483][T18864] CPU: 0 PID: 18864 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1086.272957][T18864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1086.283042][T18864] Call Trace: [ 1086.286337][T18864] [ 1086.289285][T18864] dump_stack_lvl+0x125/0x1b0 [ 1086.293991][T18864] should_fail_ex+0x496/0x5b0 [ 1086.298711][T18864] should_failslab+0x9/0x20 [ 1086.303242][T18864] kmem_cache_alloc+0x33a/0x3b0 [ 1086.308135][T18864] __kernfs_new_node+0xd3/0x8a0 [ 1086.313015][T18864] ? kernfs_add_one+0x3ca/0x510 [ 1086.317901][T18864] ? kernfs_path_from_node+0x60/0x60 [ 1086.323227][T18864] ? find_held_lock+0x2d/0x110 [ 1086.328034][T18864] ? up_write+0x1b3/0x510 [ 1086.332406][T18864] kernfs_new_node+0x94/0x110 [ 1086.337122][T18864] __kernfs_create_file+0x53/0x340 [ 1086.342278][T18864] sysfs_add_file_mode_ns+0x1ff/0x3b0 [ 1086.347790][T18864] internal_create_group+0x31c/0xb40 [ 1086.353119][T18864] ? sysfs_remove_group+0x170/0x170 [ 1086.358385][T18864] loop_configure+0xc5e/0x18c0 [ 1086.363205][T18864] lo_ioctl+0x745/0x1a50 [ 1086.367487][T18864] ? mark_held_locks+0x9f/0xe0 [ 1086.372294][T18864] ? kasan_quarantine_put+0x102/0x230 [ 1086.377739][T18864] ? loop_configure+0x18c0/0x18c0 [ 1086.382799][T18864] ? tomoyo_path_number_perm+0x273/0x590 [ 1086.384734][T18851] gre317: entered promiscuous mode [ 1086.388457][T18864] ? reacquire_held_locks+0x4b0/0x4b0 [ 1086.388498][T18864] ? tomoyo_path_number_perm+0x46e/0x590 [ 1086.388526][T18864] ? __kmem_cache_free+0xb8/0x2f0 [ 1086.388554][T18864] ? tomoyo_path_number_perm+0x190/0x590 [ 1086.388582][T18864] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1086.388636][T18864] ? reacquire_held_locks+0x4b0/0x4b0 [ 1086.388662][T18864] ? build_open_flags+0x690/0x690 [ 1086.388694][T18864] ? loop_configure+0x18c0/0x18c0 [ 1086.388728][T18864] blkdev_ioctl+0x2f9/0x770 [ 1086.388759][T18864] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1086.388786][T18864] ? bpf_lsm_file_ioctl+0x9/0x10 [ 1086.388802][T18864] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1086.388825][T18864] __x64_sys_ioctl+0x18f/0x210 [ 1086.388848][T18864] do_syscall_64+0x38/0xb0 [ 1086.388867][T18864] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1086.388885][T18864] RIP: 0033:0x7ffba087c84b [ 1086.388900][T18864] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 1086.388916][T18864] RSP: 002b:00007ffba159ae40 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1086.388933][T18864] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007ffba087c84b [ 1086.388944][T18864] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1086.388954][T18864] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1086.388963][T18864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1086.388973][T18864] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1086.415807][T18851] team388: Port device gre317 added [ 1086.417319][T18864] [ 1086.428903][T18864] loop0: detected capacity change from 0 to 24 [ 1086.430456][T18864] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1086.578808][T18864] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1086.637513][T17997] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1086.653118][T17997] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1086.658782][T18849] gre308: entered promiscuous mode [ 1086.663684][T17997] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1086.674965][T18849] team376: Port device gre308 added [ 1086.686206][T17997] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1086.696251][T17997] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1086.715219][T17997] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1086.724644][T17997] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1086.739454][T17997] usb 5-1: config 0 descriptor?? [ 1086.775168][T18850] gre314: entered promiscuous mode [ 1086.783496][T18850] team383: Port device gre314 added [ 1087.297844][T17997] usbhid 5-1:0.0: can't add hid device: -71 [ 1087.303999][T17997] usbhid: probe of 5-1:0.0 failed with error -71 [ 1087.312539][T17997] usb 5-1: USB disconnect, device number 32 20:10:18 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:18 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xdb720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xe0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:18 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 48) 20:10:18 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xdc000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:18 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xc3ffffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x1f4, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1087.773653][T18879] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1087.776121][T18875] FAULT_INJECTION: forcing a failure. [ 1087.776121][T18875] name failslab, interval 1, probability 0, space 0, times 0 [ 1087.807722][T18875] CPU: 0 PID: 18875 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1087.818193][T18875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1087.828275][T18875] Call Trace: [ 1087.831567][T18875] [ 1087.832273][T18879] team384: entered promiscuous mode [ 1087.834489][T18875] dump_stack_lvl+0x125/0x1b0 [ 1087.834522][T18875] should_fail_ex+0x496/0x5b0 [ 1087.841693][T18879] 8021q: adding VLAN 0 to HW filter on device team384 [ 1087.844370][T18875] should_failslab+0x9/0x20 [ 1087.844409][T18875] kmem_cache_alloc+0x33a/0x3b0 [ 1087.865176][T18875] __kernfs_new_node+0xd3/0x8a0 20:10:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x300, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1087.870053][T18875] ? kernfs_add_one+0x3ca/0x510 [ 1087.874979][T18875] ? kernfs_path_from_node+0x60/0x60 [ 1087.880287][T18875] ? find_held_lock+0x2d/0x110 [ 1087.885072][T18875] ? up_write+0x1b3/0x510 [ 1087.889399][T18875] kernfs_new_node+0x94/0x110 [ 1087.894077][T18875] __kernfs_create_file+0x53/0x340 [ 1087.899216][T18875] sysfs_add_file_mode_ns+0x1ff/0x3b0 [ 1087.904627][T18875] internal_create_group+0x31c/0xb40 [ 1087.909930][T18875] ? sysfs_remove_group+0x170/0x170 [ 1087.915163][T18875] loop_configure+0xc5e/0x18c0 [ 1087.919983][T18875] lo_ioctl+0x745/0x1a50 20:10:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x3e8, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x500, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1087.924255][T18875] ? mark_held_locks+0x9f/0xe0 [ 1087.929040][T18875] ? kasan_quarantine_put+0x102/0x230 [ 1087.934441][T18875] ? loop_configure+0x18c0/0x18c0 [ 1087.939505][T18875] ? tomoyo_path_number_perm+0x273/0x590 [ 1087.945151][T18875] ? reacquire_held_locks+0x4b0/0x4b0 [ 1087.950556][T18875] ? tomoyo_path_number_perm+0x46e/0x590 [ 1087.956223][T18875] ? __kmem_cache_free+0xb8/0x2f0 [ 1087.961296][T18875] ? tomoyo_path_number_perm+0x190/0x590 [ 1087.966976][T18875] ? tomoyo_execute_permission+0x4a0/0x4a0 20:10:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x600, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x700, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1087.972844][T18875] ? reacquire_held_locks+0x4b0/0x4b0 [ 1087.978259][T18875] ? build_open_flags+0x690/0x690 [ 1087.983361][T18875] ? __vm_munmap+0x180/0x390 [ 1087.988024][T18875] ? loop_configure+0x18c0/0x18c0 [ 1087.993086][T18875] blkdev_ioctl+0x2f9/0x770 [ 1087.997636][T18875] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1088.003138][T18875] ? bpf_lsm_file_ioctl+0x9/0x10 [ 1088.008105][T18875] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1088.013617][T18875] __x64_sys_ioctl+0x18f/0x210 [ 1088.018441][T18875] do_syscall_64+0x38/0xb0 [ 1088.022880][T18875] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1088.028802][T18875] RIP: 0033:0x7ffba087c84b [ 1088.033234][T18875] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 1088.052861][T18875] RSP: 002b:00007ffba159ae40 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1088.061315][T18875] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007ffba087c84b [ 1088.069291][T18875] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1088.077263][T18875] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1088.077417][ T6580] usb 5-1: new high-speed USB device number 33 using dummy_hcd [ 1088.085317][T18875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1088.085340][T18875] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1088.085371][T18875] [ 1088.096943][T18875] loop0: detected capacity change from 0 to 24 [ 1088.119880][T18875] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1088.131315][T18875] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1088.163008][T18885] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1088.183982][T18885] team389: entered promiscuous mode [ 1088.189807][T18885] 8021q: adding VLAN 0 to HW filter on device team389 [ 1088.218342][T18897] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1088.245603][T18897] team377: entered promiscuous mode [ 1088.251079][T18897] 8021q: adding VLAN 0 to HW filter on device team377 [ 1088.341791][T18898] gre309: entered promiscuous mode [ 1088.358634][T18898] team377: Port device gre309 added [ 1088.557924][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1088.568941][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1088.579560][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1088.590443][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1088.600454][ T6580] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1088.613450][ T6580] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1088.623313][ T6580] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1088.633123][ T6580] usb 5-1: config 0 descriptor?? [ 1089.197510][ T6580] usbhid 5-1:0.0: can't add hid device: -71 [ 1089.203544][ T6580] usbhid: probe of 5-1:0.0 failed with error -71 [ 1089.214490][ T6580] usb 5-1: USB disconnect, device number 33 20:10:20 executing program 4: r0 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000080)=ANY=[@ANYRES32=0x0], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) listen(r1, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f0000000700)={0x14, &(0x7f0000000600)={0x20, 0x7, 0xf6, {0xf6, 0x23, "03825a4d81c70443cef032d815c1de4b9ced8030019ffe28cb0a5e9a665cc65220793cd505cd97d0cf843d273beff0a58709ae1eea66348efde9e6d8025edfa1fa54785d99e184a45a366b618f4c7e7b090e9ba5340d1faa155ce52d9af456fd9a3a864266f1bfdde90323f867f7a3d94dfefbdca205ad317f43f054e67bcde6b21eb619c3a3af1a6e9431b3041d58cf3a50d4c868ca2caf510cb54a2e95e55741782c6903f7338b39ce1c607c7c39c67b56f85622ffa11c0375461e7f94c54bd15618683b1e6ae5e7caa30e8097b3d60dba50ab5eb0d9d550002069de73c3d34aa2ee0e4e2b6327b8e0247016f1ac4627ee168e"}}, &(0x7f00000002c0)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f00000009c0)={0x44, &(0x7f0000000740)={0x20, 0xf, 0x81, "655649a307e6a0f810750806f9237bf3197305362ddd7bb401f270fdc7b0e56a4705d2215a1c2f2e0d66fe402563f376f6690d49c73ecbb208814fc302df4051069eb3b4384760359f5f77c28800aec038330599ab0609e538daf2277f5a7a6469c45889319d889b167a14ece272a9321c335ca25804abfc135b165573d42b835e"}, &(0x7f0000000800)={0x0, 0xa, 0x1, 0x80}, &(0x7f0000000840)={0x0, 0x8, 0x1, 0x1f}, &(0x7f0000000880)={0x20, 0x80, 0x1c, {0x0, 0x7f, 0x7908, 0x3f, 0xb4, 0x4c, 0xdc, 0x6, 0x0, 0x800, 0xef, 0xfd10}}, &(0x7f00000008c0)={0x20, 0x85, 0x4, 0xf7}, &(0x7f0000000900)={0x20, 0x83, 0x2, 0x1}, &(0x7f0000000940)={0x20, 0x87, 0x2, 0x4}, &(0x7f0000000980)={0x20, 0x89, 0x2, 0x1}}) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="4c5221e3487139585dc17ad7e0a72591ff9e18684303c27fb0d1f7ad3bd67c026cea969b249cf71252a650c04484cb80db687dc8d8d85e87c94219f60f9a596d761f00d78278b663f5a71c97e3762afef756519c43ade3f863ce84f3a2e244ee87bedebed3948668e9a0cd9bbf666e83b3940f7eb7469c57aa41f7b6614d2828a3", 0x81}, {&(0x7f0000000180)="b606b89c3c0dfb9fa8e6c2ac42d39c964eefcb9b427ea3f1b6e67065503a1fe6bfec6c", 0x23}], 0x2) syz_usb_control_io$hid(r0, &(0x7f0000000380)={0x24, &(0x7f0000000200)={0x0, 0x10, 0x87, {0x87, 0xe, "d85ce98b92d99cbb929e67b9906b768b8dd1aa57f8bf36c5c2aae5ae32bea3ff8c4209a3575e89b5bd0bf1e5a0789b64940099367aa5b4b794b92868c057359df5fb8411c20cd3feb9c58744e478e8a83df261a31ea4c99a25dbe6107b52824410696e007b5668025cf61ce75ec6de839e767b10ca2b660d7f867bac03cd29db8ed5b6c6e5"}}, &(0x7f0000000580)=ANY=[@ANYBLOB="000304010004030b44002acca29655fe09e0c3b71f850a50d46e55ccf3a2054df5406baeb85d7a09671f78bdd9b5eef22d08252c4f96e5cf796c9da083050dc077f4183aab8fd9"], &(0x7f0000000300)={0x0, 0x22, 0x1c, {[@local=@item_012={0x2, 0x2, 0x9, "30d0"}, @local=@item_4={0x3, 0x2, 0x0, "e341775b"}, @global=@item_4={0x3, 0x1, 0x9, "0be802d7"}, @global=@item_4={0x3, 0x1, 0xb, "7daf7012"}, @local=@item_4={0x3, 0x2, 0xe, "a584aef5"}, @main=@item_4={0x3, 0x0, 0x8, "19b8b565"}]}}, &(0x7f0000000340)={0x0, 0x21, 0x9, {0x9, 0x21, 0x9, 0x0, 0x1, {0x22, 0xda3}}}}, &(0x7f0000000540)={0x2c, &(0x7f00000003c0)={0x0, 0xc, 0xfffffffffffffe27, "2d3743f9a6fae284432887"}, &(0x7f0000000400)={0x0, 0xa, 0x1, 0x3}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0x3f}, &(0x7f0000000480)={0x20, 0x1, 0x66, "2a210dc5e3bba8ffca81648b016f909832dbff5a5b29b354237ddd86ba95e651ed1bac97e1ac193b6745cd1210371dee7c3051355fd35bf24256487148cd732b6ec6a6b241e8c56d9474c17ce01ac0d70a82599b91b6c1215f9fd93cb554de6136a686a83076"}, &(0x7f0000000500)={0x20, 0x3, 0x1, 0x9}}) r2 = socket$inet6(0xa, 0x6, 0x0) syz_usb_control_io(r0, &(0x7f0000000040)={0x2c, &(0x7f0000000000)=ANY=[@ANYRES64=r1, @ANYRESOCT=r0, @ANYRES16=r2], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xa00, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:20 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xc4050000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:20 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xdc000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:20 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 49) 20:10:20 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe0000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xe00, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1089.684614][T18908] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1089.696711][T18909] FAULT_INJECTION: forcing a failure. [ 1089.696711][T18909] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.716279][T18909] CPU: 0 PID: 18909 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1089.726745][T18909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1089.736839][T18909] Call Trace: [ 1089.740137][T18909] [ 1089.743083][T18909] dump_stack_lvl+0x125/0x1b0 [ 1089.747787][T18909] should_fail_ex+0x496/0x5b0 [ 1089.752491][T18909] should_failslab+0x9/0x20 [ 1089.757016][T18909] kmem_cache_alloc+0x33a/0x3b0 [ 1089.761900][T18909] __kernfs_new_node+0xd3/0x8a0 [ 1089.767477][T18909] ? kernfs_add_one+0x3ca/0x510 [ 1089.772345][T18909] ? kernfs_path_from_node+0x60/0x60 [ 1089.775279][T18908] team385: entered promiscuous mode [ 1089.777720][T18909] ? find_held_lock+0x2d/0x110 [ 1089.777757][T18909] ? up_write+0x1b3/0x510 [ 1089.777781][T18909] kernfs_new_node+0x94/0x110 [ 1089.777811][T18909] __kernfs_create_file+0x53/0x340 [ 1089.777841][T18909] sysfs_add_file_mode_ns+0x1ff/0x3b0 [ 1089.777877][T18909] internal_create_group+0x31c/0xb40 [ 1089.785945][T18908] 8021q: adding VLAN 0 to HW filter on device team385 [ 1089.787840][T18909] ? sysfs_remove_group+0x170/0x170 [ 1089.787875][T18909] loop_configure+0xc5e/0x18c0 [ 1089.787912][T18909] lo_ioctl+0x745/0x1a50 [ 1089.787945][T18909] ? mark_held_locks+0x9f/0xe0 [ 1089.787972][T18909] ? kasan_quarantine_put+0x102/0x230 [ 1089.787992][T18909] ? loop_configure+0x18c0/0x18c0 [ 1089.848696][T18909] ? tomoyo_path_number_perm+0x273/0x590 [ 1089.854378][T18909] ? reacquire_held_locks+0x4b0/0x4b0 [ 1089.859752][T18909] ? tomoyo_path_number_perm+0x46e/0x590 [ 1089.865386][T18909] ? __kmem_cache_free+0xb8/0x2f0 [ 1089.870420][T18909] ? tomoyo_path_number_perm+0x190/0x590 [ 1089.876060][T18909] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1089.881884][T18909] ? reacquire_held_locks+0x4b0/0x4b0 [ 1089.887260][T18909] ? build_open_flags+0x690/0x690 [ 1089.892293][T18909] ? loop_configure+0x18c0/0x18c0 [ 1089.897324][T18909] blkdev_ioctl+0x2f9/0x770 [ 1089.901832][T18909] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1089.907295][T18909] ? bpf_lsm_file_ioctl+0x9/0x10 [ 1089.912237][T18909] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1089.917697][T18909] __x64_sys_ioctl+0x18f/0x210 [ 1089.922465][T18909] do_syscall_64+0x38/0xb0 [ 1089.926874][T18909] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1089.932764][T18909] RIP: 0033:0x7ffba087c84b [ 1089.937177][T18909] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 1089.956904][T18909] RSP: 002b:00007ffba159ae40 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1089.965329][T18909] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007ffba087c84b [ 1089.973304][T18909] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 20:10:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x1100, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1089.981278][T18909] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1089.989251][T18909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1089.997221][T18909] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1090.005206][T18909] [ 1090.018371][T18909] loop0: detected capacity change from 0 to 24 20:10:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x1400, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1090.032435][T18909] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1090.040179][T18909] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1090.049919][T18913] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:10:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x1f00, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x24ab, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1090.084526][T18913] team390: entered promiscuous mode [ 1090.090313][T18913] 8021q: adding VLAN 0 to HW filter on device team390 20:10:20 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 50) [ 1090.158333][T17997] usb 5-1: new high-speed USB device number 34 using dummy_hcd [ 1090.223209][T18927] FAULT_INJECTION: forcing a failure. [ 1090.223209][T18927] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.236199][T18927] CPU: 0 PID: 18927 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1090.246662][T18927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1090.256732][T18927] Call Trace: [ 1090.260047][T18927] [ 1090.262983][T18927] dump_stack_lvl+0x125/0x1b0 [ 1090.267673][T18927] should_fail_ex+0x496/0x5b0 [ 1090.272373][T18927] should_failslab+0x9/0x20 [ 1090.276889][T18927] kmem_cache_alloc+0x33a/0x3b0 [ 1090.281776][T18927] __kernfs_new_node+0xd3/0x8a0 [ 1090.286656][T18927] ? kernfs_add_one+0x3ca/0x510 [ 1090.291525][T18927] ? kernfs_path_from_node+0x60/0x60 [ 1090.296824][T18927] ? find_held_lock+0x2d/0x110 [ 1090.301605][T18927] ? up_write+0x1b3/0x510 [ 1090.306036][T18927] kernfs_new_node+0x94/0x110 [ 1090.310733][T18927] __kernfs_create_file+0x53/0x340 [ 1090.315862][T18927] sysfs_add_file_mode_ns+0x1ff/0x3b0 [ 1090.321261][T18927] internal_create_group+0x31c/0xb40 [ 1090.326550][T18927] ? sysfs_remove_group+0x170/0x170 [ 1090.331769][T18927] loop_configure+0xc5e/0x18c0 [ 1090.336549][T18927] lo_ioctl+0x745/0x1a50 [ 1090.340806][T18927] ? mark_held_locks+0x9f/0xe0 [ 1090.345574][T18927] ? kasan_quarantine_put+0x102/0x230 [ 1090.350953][T18927] ? loop_configure+0x18c0/0x18c0 [ 1090.355992][T18927] ? tomoyo_path_number_perm+0x273/0x590 [ 1090.361641][T18927] ? reacquire_held_locks+0x4b0/0x4b0 [ 1090.367026][T18927] ? tomoyo_path_number_perm+0x46e/0x590 [ 1090.372676][T18927] ? __kmem_cache_free+0xb8/0x2f0 [ 1090.377710][T18927] ? tomoyo_path_number_perm+0x190/0x590 [ 1090.383349][T18927] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1090.389183][T18927] ? reacquire_held_locks+0x4b0/0x4b0 [ 1090.394562][T18927] ? build_open_flags+0x690/0x690 [ 1090.399647][T18927] ? loop_configure+0x18c0/0x18c0 [ 1090.404695][T18927] blkdev_ioctl+0x2f9/0x770 [ 1090.409206][T18927] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1090.414690][T18927] ? bpf_lsm_file_ioctl+0x9/0x10 [ 1090.419624][T18927] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1090.425088][T18927] __x64_sys_ioctl+0x18f/0x210 [ 1090.429860][T18927] do_syscall_64+0x38/0xb0 [ 1090.434275][T18927] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1090.440164][T18927] RIP: 0033:0x7ffba087c84b [ 1090.444572][T18927] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 1090.464179][T18927] RSP: 002b:00007ffba159ae40 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1090.472591][T18927] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007ffba087c84b [ 1090.480567][T18927] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1090.488539][T18927] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1090.496505][T18927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1090.504474][T18927] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1090.512457][T18927] [ 1090.584824][T18915] gre318: entered promiscuous mode [ 1090.587501][T17997] usb 5-1: device descriptor read/64, error 18 [ 1090.604312][T18915] team390: Port device gre318 added [ 1090.615384][T18916] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1090.624962][T18927] loop0: detected capacity change from 0 to 24 [ 1090.643044][T18927] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1090.648588][T18916] team378: entered promiscuous mode [ 1090.650191][T18927] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1090.655429][T18916] 8021q: adding VLAN 0 to HW filter on device team378 [ 1090.811333][T18908] gre315: entered promiscuous mode [ 1090.820705][T18908] team385: Port device gre315 added [ 1090.870110][T17997] usb 5-1: new high-speed USB device number 35 using dummy_hcd [ 1090.940893][T18906] gre310: entered promiscuous mode [ 1090.949785][T18906] team378: Port device gre310 added [ 1091.067523][T17997] usb 5-1: device descriptor read/64, error 18 [ 1091.188278][T17997] usb usb5-port1: attempt power cycle [ 1091.597446][T17997] usb 5-1: new high-speed USB device number 36 using dummy_hcd [ 1091.767625][T17997] usb 5-1: device descriptor read/8, error -61 [ 1092.047505][T17997] usb 5-1: new high-speed USB device number 37 using dummy_hcd [ 1092.267588][T17997] usb 5-1: device descriptor read/8, error -61 [ 1092.388782][T17997] usb usb5-port1: unable to enumerate USB device 20:10:23 executing program 4: r0 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000080)=ANY=[@ANYRES32=0x0], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) r1 = socket$inet6(0xa, 0x6, 0x0) listen(r1, 0x0) (async, rerun: 64) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f0000000700)={0x14, &(0x7f0000000600)={0x20, 0x7, 0xf6, {0xf6, 0x23, "03825a4d81c70443cef032d815c1de4b9ced8030019ffe28cb0a5e9a665cc65220793cd505cd97d0cf843d273beff0a58709ae1eea66348efde9e6d8025edfa1fa54785d99e184a45a366b618f4c7e7b090e9ba5340d1faa155ce52d9af456fd9a3a864266f1bfdde90323f867f7a3d94dfefbdca205ad317f43f054e67bcde6b21eb619c3a3af1a6e9431b3041d58cf3a50d4c868ca2caf510cb54a2e95e55741782c6903f7338b39ce1c607c7c39c67b56f85622ffa11c0375461e7f94c54bd15618683b1e6ae5e7caa30e8097b3d60dba50ab5eb0d9d550002069de73c3d34aa2ee0e4e2b6327b8e0247016f1ac4627ee168e"}}, &(0x7f00000002c0)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f00000009c0)={0x44, &(0x7f0000000740)={0x20, 0xf, 0x81, "655649a307e6a0f810750806f9237bf3197305362ddd7bb401f270fdc7b0e56a4705d2215a1c2f2e0d66fe402563f376f6690d49c73ecbb208814fc302df4051069eb3b4384760359f5f77c28800aec038330599ab0609e538daf2277f5a7a6469c45889319d889b167a14ece272a9321c335ca25804abfc135b165573d42b835e"}, &(0x7f0000000800)={0x0, 0xa, 0x1, 0x80}, &(0x7f0000000840)={0x0, 0x8, 0x1, 0x1f}, &(0x7f0000000880)={0x20, 0x80, 0x1c, {0x0, 0x7f, 0x7908, 0x3f, 0xb4, 0x4c, 0xdc, 0x6, 0x0, 0x800, 0xef, 0xfd10}}, &(0x7f00000008c0)={0x20, 0x85, 0x4, 0xf7}, &(0x7f0000000900)={0x20, 0x83, 0x2, 0x1}, &(0x7f0000000940)={0x20, 0x87, 0x2, 0x4}, &(0x7f0000000980)={0x20, 0x89, 0x2, 0x1}}) (async, rerun: 64) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="4c5221e3487139585dc17ad7e0a72591ff9e18684303c27fb0d1f7ad3bd67c026cea969b249cf71252a650c04484cb80db687dc8d8d85e87c94219f60f9a596d761f00d78278b663f5a71c97e3762afef756519c43ade3f863ce84f3a2e244ee87bedebed3948668e9a0cd9bbf666e83b3940f7eb7469c57aa41f7b6614d2828a3", 0x81}, {&(0x7f0000000180)="b606b89c3c0dfb9fa8e6c2ac42d39c964eefcb9b427ea3f1b6e67065503a1fe6bfec6c", 0x23}], 0x2) syz_usb_control_io$hid(r0, &(0x7f0000000380)={0x24, &(0x7f0000000200)={0x0, 0x10, 0x87, {0x87, 0xe, "d85ce98b92d99cbb929e67b9906b768b8dd1aa57f8bf36c5c2aae5ae32bea3ff8c4209a3575e89b5bd0bf1e5a0789b64940099367aa5b4b794b92868c057359df5fb8411c20cd3feb9c58744e478e8a83df261a31ea4c99a25dbe6107b52824410696e007b5668025cf61ce75ec6de839e767b10ca2b660d7f867bac03cd29db8ed5b6c6e5"}}, &(0x7f0000000580)=ANY=[@ANYBLOB="000304010004030b44002acca29655fe09e0c3b71f850a50d46e55ccf3a2054df5406baeb85d7a09671f78bdd9b5eef22d08252c4f96e5cf796c9da083050dc077f4183aab8fd9"], &(0x7f0000000300)={0x0, 0x22, 0x1c, {[@local=@item_012={0x2, 0x2, 0x9, "30d0"}, @local=@item_4={0x3, 0x2, 0x0, "e341775b"}, @global=@item_4={0x3, 0x1, 0x9, "0be802d7"}, @global=@item_4={0x3, 0x1, 0xb, "7daf7012"}, @local=@item_4={0x3, 0x2, 0xe, "a584aef5"}, @main=@item_4={0x3, 0x0, 0x8, "19b8b565"}]}}, &(0x7f0000000340)={0x0, 0x21, 0x9, {0x9, 0x21, 0x9, 0x0, 0x1, {0x22, 0xda3}}}}, &(0x7f0000000540)={0x2c, &(0x7f00000003c0)={0x0, 0xc, 0xfffffffffffffe27, "2d3743f9a6fae284432887"}, &(0x7f0000000400)={0x0, 0xa, 0x1, 0x3}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0x3f}, &(0x7f0000000480)={0x20, 0x1, 0x66, "2a210dc5e3bba8ffca81648b016f909832dbff5a5b29b354237ddd86ba95e651ed1bac97e1ac193b6745cd1210371dee7c3051355fd35bf24256487148cd732b6ec6a6b241e8c56d9474c17ce01ac0d70a82599b91b6c1215f9fd93cb554de6136a686a83076"}, &(0x7f0000000500)={0x20, 0x3, 0x1, 0x9}}) (async, rerun: 32) r2 = socket$inet6(0xa, 0x6, 0x0) (rerun: 32) syz_usb_control_io(r0, &(0x7f0000000040)={0x2c, &(0x7f0000000000)=ANY=[@ANYRES64=r1, @ANYRESOCT=r0, @ANYRES16=r2], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2800, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:23 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xdc720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:23 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 51) 20:10:23 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xc5620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:23 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe4ffffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x3600, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1092.730192][T18932] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1092.746091][T18935] FAULT_INJECTION: forcing a failure. [ 1092.746091][T18935] name failslab, interval 1, probability 0, space 0, times 0 [ 1092.789084][T18935] CPU: 1 PID: 18935 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1092.799563][T18935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1092.807015][T18932] team386: entered promiscuous mode [ 1092.809649][T18935] Call Trace: [ 1092.809659][T18935] [ 1092.809666][T18935] dump_stack_lvl+0x125/0x1b0 [ 1092.809695][T18935] should_fail_ex+0x496/0x5b0 [ 1092.809724][T18935] should_failslab+0x9/0x20 [ 1092.809751][T18935] kmem_cache_alloc+0x33a/0x3b0 [ 1092.823051][T18932] 8021q: adding VLAN 0 to HW filter on device team386 [ 1092.825838][T18935] ? userfaultfd_unmap_prep+0x4d0/0x4d0 [ 1092.852261][T18935] getname_flags.part.0+0x50/0x4d0 [ 1092.857407][T18935] getname+0x90/0xe0 [ 1092.861345][T18935] do_sys_openat2+0x100/0x1e0 [ 1092.866106][T18935] ? build_open_flags+0x690/0x690 [ 1092.871173][T18935] ? __vm_munmap+0x180/0x390 [ 1092.875821][T18935] ? do_vmi_munmap+0x450/0x450 [ 1092.880658][T18935] __x64_sys_openat+0x175/0x210 [ 1092.885542][T18935] ? __ia32_sys_open+0x1e0/0x1e0 [ 1092.890523][T18935] ? syscall_enter_from_user_mode+0x26/0x80 [ 1092.896446][T18935] do_syscall_64+0x38/0xb0 [ 1092.900880][T18935] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1092.906784][T18935] RIP: 0033:0x7ffba087b6e0 [ 1092.911202][T18935] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 09 82 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 5c 82 02 00 8b 44 [ 1092.930827][T18935] RSP: 002b:00007ffba159ae20 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 20:10:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x4000, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x6000, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1092.939260][T18935] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007ffba087b6e0 [ 1092.947238][T18935] RDX: 0000000000000002 RSI: 00007ffba159af40 RDI: 00000000ffffff9c [ 1092.955228][T18935] RBP: 00007ffba159af40 R08: 0000000000000000 R09: 000000000000015a [ 1092.963233][T18935] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 1092.971208][T18935] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1092.979190][T18935] 20:10:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xab24, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xe000, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:23 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 52) [ 1093.120328][T18941] gre316: entered promiscuous mode [ 1093.175433][T18941] team386: Port device gre316 added [ 1093.183720][T18954] loop0: detected capacity change from 0 to 24 [ 1093.191121][T18954] FAULT_INJECTION: forcing a failure. [ 1093.191121][T18954] name failslab, interval 1, probability 0, space 0, times 0 [ 1093.191189][T18943] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1093.204229][T18954] CPU: 1 PID: 18954 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1093.223740][T18954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1093.233820][T18954] Call Trace: [ 1093.236759][T18943] team379: entered promiscuous mode [ 1093.237099][T18954] [ 1093.237108][T18954] dump_stack_lvl+0x125/0x1b0 [ 1093.237139][T18954] should_fail_ex+0x496/0x5b0 [ 1093.246772][T18943] 8021q: adding VLAN 0 to HW filter on device team379 [ 1093.249902][T18954] ? __d_alloc+0x32/0xac0 [ 1093.249944][T18954] should_failslab+0x9/0x20 [ 1093.249971][T18954] kmem_cache_alloc_lru+0x3e6/0x630 [ 1093.249995][T18954] ? reacquire_held_locks+0x4b0/0x4b0 [ 1093.250025][T18954] ? __d_alloc+0x32/0xac0 [ 1093.250050][T18954] __d_alloc+0x32/0xac0 [ 1093.250080][T18954] d_alloc+0x4e/0x220 [ 1093.250109][T18954] lookup_one_qstr_excl+0xc7/0x180 [ 1093.250128][T18954] ? mnt_want_write+0x161/0x440 [ 1093.303397][T18954] filename_create+0x1ed/0x530 [ 1093.308190][T18954] ? vfs_path_parent_lookup+0x50/0x50 [ 1093.313591][T18954] ? preempt_count_sub+0x150/0x150 [ 1093.318734][T18954] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1093.324655][T18954] ? __virt_addr_valid+0x5e/0x2d0 [ 1093.329707][T18954] do_mkdirat+0xb3/0x330 [ 1093.333971][T18954] ? __ia32_sys_mknod+0xb0/0xb0 [ 1093.338844][T18954] ? getname_flags.part.0+0x1d5/0x4d0 [ 1093.344241][T18954] __x64_sys_mkdirat+0x115/0x170 [ 1093.349205][T18954] do_syscall_64+0x38/0xb0 [ 1093.353643][T18954] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1093.359570][T18954] RIP: 0033:0x7ffba087b5e7 [ 1093.364001][T18954] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1093.383686][T18954] RSP: 002b:00007ffba159aee8 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1093.392140][T18954] RAX: ffffffffffffffda RBX: 0000000020004400 RCX: 00007ffba087b5e7 [ 1093.400143][T18954] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 1093.408154][T18954] RBP: 0000000020000140 R08: 0000000000000000 R09: 000000000000015a [ 1093.416149][T18954] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1093.424135][T18954] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1093.432132][T18954] [ 1093.513836][T18936] gre311: entered promiscuous mode [ 1093.530857][T18936] team379: Port device gre311 added [ 1093.537856][T18937] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1093.559350][T18937] team391: entered promiscuous mode [ 1093.564918][T18937] 8021q: adding VLAN 0 to HW filter on device team391 [ 1093.599901][ T6580] usb 5-1: new high-speed USB device number 38 using dummy_hcd [ 1093.697756][T18948] gre319: entered promiscuous mode [ 1093.705454][T18948] team391: Port device gre319 added [ 1093.811069][ T6580] usb 5-1: device descriptor read/64, error 18 [ 1094.087454][ T6580] usb 5-1: new high-speed USB device number 39 using dummy_hcd [ 1094.307457][ T6580] usb 5-1: device descriptor read/64, error 18 [ 1094.427646][ T6580] usb usb5-port1: attempt power cycle [ 1094.857508][ T6580] usb 5-1: new high-speed USB device number 40 using dummy_hcd [ 1095.067397][ T6580] usb 5-1: device descriptor read/8, error -61 [ 1095.347498][ T6580] usb 5-1: new high-speed USB device number 41 using dummy_hcd [ 1095.537485][ T6580] usb 5-1: device descriptor read/8, error -61 [ 1095.657571][ T6580] usb usb5-port1: unable to enumerate USB device 20:10:26 executing program 4: r0 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000080)=ANY=[@ANYRES32=0x0], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) listen(r1, 0x0) (async) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, &(0x7f0000000700)={0x14, &(0x7f0000000600)={0x20, 0x7, 0xf6, {0xf6, 0x23, "03825a4d81c70443cef032d815c1de4b9ced8030019ffe28cb0a5e9a665cc65220793cd505cd97d0cf843d273beff0a58709ae1eea66348efde9e6d8025edfa1fa54785d99e184a45a366b618f4c7e7b090e9ba5340d1faa155ce52d9af456fd9a3a864266f1bfdde90323f867f7a3d94dfefbdca205ad317f43f054e67bcde6b21eb619c3a3af1a6e9431b3041d58cf3a50d4c868ca2caf510cb54a2e95e55741782c6903f7338b39ce1c607c7c39c67b56f85622ffa11c0375461e7f94c54bd15618683b1e6ae5e7caa30e8097b3d60dba50ab5eb0d9d550002069de73c3d34aa2ee0e4e2b6327b8e0247016f1ac4627ee168e"}}, &(0x7f00000002c0)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f00000009c0)={0x44, &(0x7f0000000740)={0x20, 0xf, 0x81, "655649a307e6a0f810750806f9237bf3197305362ddd7bb401f270fdc7b0e56a4705d2215a1c2f2e0d66fe402563f376f6690d49c73ecbb208814fc302df4051069eb3b4384760359f5f77c28800aec038330599ab0609e538daf2277f5a7a6469c45889319d889b167a14ece272a9321c335ca25804abfc135b165573d42b835e"}, &(0x7f0000000800)={0x0, 0xa, 0x1, 0x80}, &(0x7f0000000840)={0x0, 0x8, 0x1, 0x1f}, &(0x7f0000000880)={0x20, 0x80, 0x1c, {0x0, 0x7f, 0x7908, 0x3f, 0xb4, 0x4c, 0xdc, 0x6, 0x0, 0x800, 0xef, 0xfd10}}, &(0x7f00000008c0)={0x20, 0x85, 0x4, 0xf7}, &(0x7f0000000900)={0x20, 0x83, 0x2, 0x1}, &(0x7f0000000940)={0x20, 0x87, 0x2, 0x4}, &(0x7f0000000980)={0x20, 0x89, 0x2, 0x1}}) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="4c5221e3487139585dc17ad7e0a72591ff9e18684303c27fb0d1f7ad3bd67c026cea969b249cf71252a650c04484cb80db687dc8d8d85e87c94219f60f9a596d761f00d78278b663f5a71c97e3762afef756519c43ade3f863ce84f3a2e244ee87bedebed3948668e9a0cd9bbf666e83b3940f7eb7469c57aa41f7b6614d2828a3", 0x81}, {&(0x7f0000000180)="b606b89c3c0dfb9fa8e6c2ac42d39c964eefcb9b427ea3f1b6e67065503a1fe6bfec6c", 0x23}], 0x2) syz_usb_control_io$hid(r0, &(0x7f0000000380)={0x24, &(0x7f0000000200)={0x0, 0x10, 0x87, {0x87, 0xe, "d85ce98b92d99cbb929e67b9906b768b8dd1aa57f8bf36c5c2aae5ae32bea3ff8c4209a3575e89b5bd0bf1e5a0789b64940099367aa5b4b794b92868c057359df5fb8411c20cd3feb9c58744e478e8a83df261a31ea4c99a25dbe6107b52824410696e007b5668025cf61ce75ec6de839e767b10ca2b660d7f867bac03cd29db8ed5b6c6e5"}}, &(0x7f0000000580)=ANY=[@ANYBLOB="000304010004030b44002acca29655fe09e0c3b71f850a50d46e55ccf3a2054df5406baeb85d7a09671f78bdd9b5eef22d08252c4f96e5cf796c9da083050dc077f4183aab8fd9"], &(0x7f0000000300)={0x0, 0x22, 0x1c, {[@local=@item_012={0x2, 0x2, 0x9, "30d0"}, @local=@item_4={0x3, 0x2, 0x0, "e341775b"}, @global=@item_4={0x3, 0x1, 0x9, "0be802d7"}, @global=@item_4={0x3, 0x1, 0xb, "7daf7012"}, @local=@item_4={0x3, 0x2, 0xe, "a584aef5"}, @main=@item_4={0x3, 0x0, 0x8, "19b8b565"}]}}, &(0x7f0000000340)={0x0, 0x21, 0x9, {0x9, 0x21, 0x9, 0x0, 0x1, {0x22, 0xda3}}}}, &(0x7f0000000540)={0x2c, &(0x7f00000003c0)={0x0, 0xc, 0xfffffffffffffe27, "2d3743f9a6fae284432887"}, &(0x7f0000000400)={0x0, 0xa, 0x1, 0x3}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0x3f}, &(0x7f0000000480)={0x20, 0x1, 0x66, "2a210dc5e3bba8ffca81648b016f909832dbff5a5b29b354237ddd86ba95e651ed1bac97e1ac193b6745cd1210371dee7c3051355fd35bf24256487148cd732b6ec6a6b241e8c56d9474c17ce01ac0d70a82599b91b6c1215f9fd93cb554de6136a686a83076"}, &(0x7f0000000500)={0x20, 0x3, 0x1, 0x9}}) (async) r2 = socket$inet6(0xa, 0x6, 0x0) syz_usb_control_io(r0, &(0x7f0000000040)={0x2c, &(0x7f0000000000)=ANY=[@ANYRES64=r1, @ANYRESOCT=r0, @ANYRES16=r2], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xe5ff, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xc6620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:26 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe8000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:26 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 53) 20:10:26 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xdd720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xe803, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1095.790942][T18961] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1095.817249][T18959] loop0: detected capacity change from 0 to 24 [ 1095.824831][T18959] FAULT_INJECTION: forcing a failure. [ 1095.824831][T18959] name failslab, interval 1, probability 0, space 0, times 0 [ 1095.851595][T18959] CPU: 0 PID: 18959 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1095.862085][T18959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1095.872185][T18959] Call Trace: [ 1095.875480][T18959] [ 1095.878436][T18959] dump_stack_lvl+0x125/0x1b0 [ 1095.883147][T18959] should_fail_ex+0x496/0x5b0 [ 1095.883328][T18961] team387: entered promiscuous mode [ 1095.887849][T18959] should_failslab+0x9/0x20 [ 1095.887883][T18959] __kmem_cache_alloc_node+0x2fd/0x350 [ 1095.887907][T18959] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1095.887941][T18959] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1095.894339][T18961] 8021q: adding VLAN 0 to HW filter on device team387 [ 1095.897712][T18959] __kmalloc+0x4c/0x100 [ 1095.897752][T18959] tomoyo_realpath_from_path+0xb9/0x710 [ 1095.897785][T18959] ? tomoyo_profile+0x47/0x60 [ 1095.897812][T18959] tomoyo_path_number_perm+0x243/0x590 [ 1095.941265][T18959] ? tomoyo_path_number_perm+0x1eb/0x590 [ 1095.946920][T18959] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1095.952739][T18959] ? ext4_fname_setup_filename+0x120/0x120 [ 1095.958565][T18959] ? d_splice_alias+0x4d5/0xdf0 [ 1095.963443][T18959] ? do_raw_spin_unlock+0x173/0x230 [ 1095.968651][T18959] ? _raw_spin_unlock+0x28/0x40 [ 1095.973503][T18959] ? hook_path_mkdir+0x42d/0x500 [ 1095.978443][T18959] ? d_alloc+0x1b7/0x220 [ 1095.982700][T18959] tomoyo_path_mkdir+0x9c/0xe0 [ 1095.987465][T18959] ? tomoyo_file_ioctl+0x30/0x30 [ 1095.992409][T18959] security_path_mkdir+0x10e/0x170 [ 1095.997547][T18959] do_mkdirat+0x163/0x330 [ 1096.001884][T18959] ? __ia32_sys_mknod+0xb0/0xb0 [ 1096.006744][T18959] ? getname_flags.part.0+0x1d5/0x4d0 [ 1096.012124][T18959] __x64_sys_mkdirat+0x115/0x170 [ 1096.017066][T18959] do_syscall_64+0x38/0xb0 [ 1096.021484][T18959] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1096.027466][T18959] RIP: 0033:0x7ffba087b5e7 [ 1096.031875][T18959] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1096.051490][T18959] RSP: 002b:00007ffba159aee8 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1096.059907][T18959] RAX: ffffffffffffffda RBX: 0000000020004400 RCX: 00007ffba087b5e7 [ 1096.067904][T18959] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 1096.075899][T18959] RBP: 0000000020000140 R08: 0000000000000000 R09: 000000000000015a [ 1096.083884][T18959] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1096.091872][T18959] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1096.099897][T18959] 20:10:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xf401, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xffe5, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1096.113205][T18959] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1096.130057][T18959] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1096.146743][T18959] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:10:26 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 54) 20:10:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x2, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1096.345879][T18967] gre317: entered promiscuous mode [ 1096.365718][T18967] team387: Port device gre317 added [ 1096.372079][T18971] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1096.395439][T18983] loop0: detected capacity change from 0 to 24 [ 1096.412804][T18971] team380: entered promiscuous mode [ 1096.417547][T18983] FAULT_INJECTION: forcing a failure. [ 1096.417547][T18983] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.418665][T18971] 8021q: adding VLAN 0 to HW filter on device team380 [ 1096.431557][T18983] CPU: 1 PID: 18983 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1096.448142][T18983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1096.458240][T18983] Call Trace: [ 1096.461537][T18983] [ 1096.464480][T18983] dump_stack_lvl+0x125/0x1b0 [ 1096.466565][ T5045] usb 5-1: new high-speed USB device number 42 using dummy_hcd [ 1096.469167][T18983] should_fail_ex+0x496/0x5b0 [ 1096.469201][T18983] should_failslab+0x9/0x20 [ 1096.486001][T18983] __kmem_cache_alloc_node+0x2fd/0x350 [ 1096.491523][T18983] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1096.497310][T18983] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1096.503081][T18983] __kmalloc+0x4c/0x100 [ 1096.507271][T18983] tomoyo_realpath_from_path+0xb9/0x710 [ 1096.512864][T18983] ? tomoyo_profile+0x47/0x60 [ 1096.517567][T18983] tomoyo_path_number_perm+0x243/0x590 [ 1096.521980][T18969] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1096.523054][T18983] ? tomoyo_path_number_perm+0x1eb/0x590 [ 1096.537905][T18983] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1096.543760][T18983] ? ext4_fname_setup_filename+0x120/0x120 [ 1096.549623][T18983] ? d_splice_alias+0x4d5/0xdf0 [ 1096.551279][T18969] team392: entered promiscuous mode [ 1096.554510][T18983] ? do_raw_spin_unlock+0x173/0x230 [ 1096.554548][T18983] ? _raw_spin_unlock+0x28/0x40 [ 1096.565067][T18969] 8021q: adding VLAN 0 to HW filter on device team392 [ 1096.569832][T18983] ? hook_path_mkdir+0x42d/0x500 [ 1096.569859][T18983] ? d_alloc+0x1b7/0x220 [ 1096.569892][T18983] tomoyo_path_mkdir+0x9c/0xe0 [ 1096.569912][T18983] ? tomoyo_file_ioctl+0x30/0x30 [ 1096.595552][T18983] security_path_mkdir+0x10e/0x170 [ 1096.600699][T18983] do_mkdirat+0x163/0x330 [ 1096.605050][T18983] ? __ia32_sys_mknod+0xb0/0xb0 [ 1096.609925][T18983] ? getname_flags.part.0+0x1d5/0x4d0 [ 1096.615320][T18983] __x64_sys_mkdirat+0x115/0x170 [ 1096.620291][T18983] do_syscall_64+0x38/0xb0 [ 1096.624726][T18983] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1096.630638][T18983] RIP: 0033:0x7ffba087b5e7 [ 1096.635069][T18983] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1096.654697][T18983] RSP: 002b:00007ffba159aee8 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1096.657752][ T5045] usb 5-1: device descriptor read/64, error 18 [ 1096.663143][T18983] RAX: ffffffffffffffda RBX: 0000000020004400 RCX: 00007ffba087b5e7 [ 1096.677311][T18983] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 1096.685299][T18983] RBP: 0000000020000140 R08: 0000000000000000 R09: 000000000000015a [ 1096.693284][T18983] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1096.701269][T18983] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1096.709355][T18983] [ 1096.722610][T18983] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1096.730228][T18983] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1096.738230][T18983] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1096.772622][T18973] gre320: entered promiscuous mode [ 1096.784013][T18973] team392: Port device gre320 added [ 1096.895701][T18964] gre312: entered promiscuous mode [ 1096.903835][T18964] team380: Port device gre312 added [ 1096.949644][ T5045] usb 5-1: new high-speed USB device number 43 using dummy_hcd [ 1097.137680][ T5045] usb 5-1: device descriptor read/64, error 18 [ 1097.257585][ T5045] usb usb5-port1: attempt power cycle [ 1097.687480][ T5045] usb 5-1: new high-speed USB device number 44 using dummy_hcd [ 1097.867620][ T5045] usb 5-1: device descriptor read/8, error -61 [ 1098.137544][ T5045] usb 5-1: new high-speed USB device number 45 using dummy_hcd [ 1098.307545][ T5045] usb 5-1: device descriptor read/8, error -61 [ 1098.429746][ T5045] usb usb5-port1: unable to enumerate USB device 20:10:29 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xc7620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x3, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:29 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 55) 20:10:29 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xde720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:29 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:29 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0xe2ea3009931fb5a2, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_disconnect(r1) syz_usb_control_io$hid(r1, &(0x7f0000000200)={0x24, &(0x7f0000000380)={0x0, 0x22, 0x81, {0x81, 0x11, "e196eb6c6a576f6f394ca9bcd55f99084b7a6741a0e8d747f47ad7ca207438bc09a3f3a2c3fecad1e0f15f70e3b71dd2e7423996b69506d395f5feff7c026870886e9eb745f5ccffedc614f59c823f8a8ae00fdf41fa02ae1f12993f92ed3adb4900d668c927d730f6b5885849ee3d2eb7249ee37500f0e3fb94e4d5246c01"}}, &(0x7f0000000440)={0x0, 0x3, 0xaf, @string={0xaf, 0x3, "ed845b1ab9a60f6ed9e6b957c78d33a7e53f0809a55f79ab265874d1166236072ad2d9035b69f0aa24a5570548d358a9d56bdd66256b15ebf90f5b92ede88185ceb20c00cb235e12c4f46f126c7faa09139cd884f4c5b0fbe9fb8c5b61583a5894fb6ac6dd13db71f52e23db76493e1057c66cebd96448223754ddd9d5b1424a32a0d9e2fb45ba108f9e45269c3630dbad6590042ca802b6a62a88e71b3e7f6683e592cac6902f6e492d550da3"}}, &(0x7f0000000140)={0x0, 0x22, 0x23, {[@local=@item_012={0x2, 0x2, 0x0, "9f5a"}, @local=@item_012={0x1, 0x2, 0x9, 'S'}, @global=@item_4={0x3, 0x1, 0x4, "9baee853"}, @local=@item_4={0x3, 0x2, 0x1, 'gY|A'}, @local=@item_4={0x3, 0x2, 0x0, "5da40ef7"}, @local=@item_4={0x3, 0x2, 0x0, "2b144abd"}, @main=@item_4={0x3, 0x0, 0xb, "8b0c1205"}, @global=@item_4={0x3, 0x1, 0x6, "b0102f78"}]}}, &(0x7f0000000180)={0x0, 0x21, 0x9, {0x9, 0x21, 0xfffe, 0x9, 0x1, {0x22, 0xf19}}}}, &(0x7f0000000700)={0x2c, &(0x7f0000000500)={0x20, 0xd, 0xaa, "127721eb3acfa41ee3e0ea112c72d2b2ba5bb49c50814189334a2f42cb8c9c4a35163c09574942788c107acaa8efab3c10ccde0f2864af61d9f3ed15c4909c7877e6eea4849b795865ef8d7af0d127cdedc2198c6b44cc3cb1a4c7ac14bfa152bbc5f8cb1fdf1b4d938d5040202b1ab72dadf071a6537d3e8046cf7d8041198b1758cae1464b2260302e0e250f15d6727613662b355b1f7266aebef19c7a199babe758a528a065c5a3d4"}, &(0x7f00000005c0)={0x0, 0xa, 0x1, 0x7}, &(0x7f0000000600)={0x0, 0x8, 0x1, 0x81}, &(0x7f0000000640)={0x20, 0x1, 0x6d, "5bfc403f20e3cb9cea1ed8f24b2f8b50317766209c6c686c58aea716b22e02d32977d6f35b7d65512108a277cc90a46195c22ce5b2bf4e8ab197cbde6988736f1bba8777a0afffc942939b2eaeabb87e30ab9c1244f18da75bf60fa6d1ad42b30cfdfeb1ceec6b616b2375373b"}, &(0x7f00000006c0)={0x20, 0x3, 0x1, 0xe4}}) socket$inet(0x10, 0x80803, 0x4000000000000004) r2 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) r3 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) sendmsg(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc4114ef582eb3412a6a4a363181180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6a", 0x4c}], 0x1}, 0x0) r4 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r4, 0x82, 0x0, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) listen(r5, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01", @ANYRESOCT=r5, @ANYBLOB="615dcd92a27ec0b02a1a4c3a0238b03dd9e28b99b646d016324336df9efda43a7cfb320794118254f5fe644388b14b9e5ac8ef0de5ab3e4b714050c4ece6555c7346c7a1443751e942"], 0x0, 0x0, 0x0, 0x0}, 0x0) r6 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r6, 0x82, 0x0, 0x0) syz_usb_control_io(r6, &(0x7f0000000980)={0x2c, &(0x7f0000000740)={0x0, 0x21, 0xa4, {0xa4, 0x20, "bec3a148570776d5c8ace17a005ccd33cbe93e05f58973f83d78a9eca1b258dbb16d22f575280e719bc6cc0374f0f218fc0be116a15a869f9a6738294748c0dbb9b91146985df52030f2f9ba33d1cb04017fe07ed2c5a56c8221e8fc9f4313a0920ed96e24f01c28f27a8751287c8ca597ce788bfc0f12df397f2dade9d0c9ea0fdcecdc01b7aaeb0b976ded38ebfbf62cadc56f8d8a0c67b904fa42fde6666a7b46"}}, &(0x7f0000000800)={0x0, 0x3, 0x79, @string={0x79, 0x3, "9328c24e425dd06a8758ace6bc9a9aa6e6196488df2c15b162aa0cc0cb90c22944be446496050c31a59b572bccf3892009d5428e597afb0c343fba54339948e666babfa14eb38b21338d0a1a917b7c2ef1ac44eb9bf48c3de8465645924ea2ebe89d9be8e3c242cd4ba80698cffdb178a48278a5b037f7"}}, &(0x7f0000000880)={0x0, 0xf, 0x3c, {0x5, 0xf, 0x3c, 0x5, [@ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x8, 0x8, 0x2, 0x9}, @wireless={0xb, 0x10, 0x1, 0x4, 0x88, 0x0, 0x8, 0x7, 0x8f}, @ss_container_id={0x14, 0x10, 0x4, 0x1, "5dd50cd3bc9add9524083a3db2e08afb"}, @wireless={0xb, 0x10, 0x1, 0xc, 0xe0, 0x7, 0x0, 0x1c1e, 0x4}]}}, &(0x7f0000000900)={0x20, 0x29, 0xf, {0xf, 0x29, 0x8e, 0x2, 0x0, 0x5, "31a1fbf7", "77900ae0"}}, &(0x7f0000000940)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x5, 0x4, 0x0, 0x9, 0x80, 0x6, 0x8}}}, &(0x7f0000000dc0)={0x84, &(0x7f00000009c0)={0x40, 0x11, 0x20, "aeccfa97ca25de43485ed3a6553fd867eaf1af2e421a76e6c2cb035fd99b1421"}, &(0x7f0000000a00)={0x0, 0xa, 0x1, 0x1f}, &(0x7f0000000a40)={0x0, 0x8, 0x1, 0x3d}, &(0x7f0000000a80)={0x20, 0x0, 0x4}, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2000270000000020000000d47a00"], &(0x7f0000000b00)={0x40, 0x7, 0x2, 0x3dd}, &(0x7f0000000b40)={0x40, 0x9, 0x1, 0x1f}, &(0x7f0000000b80)={0x40, 0xb, 0x2, 'v!'}, &(0x7f0000000bc0)={0x40, 0xf, 0x2, 0x5}, &(0x7f0000000c00)={0x40, 0x13, 0x6, @multicast}, &(0x7f0000000c40)={0x40, 0x17, 0x6, @multicast}, &(0x7f0000000c80)={0x40, 0x19, 0x2, "1430"}, &(0x7f0000000cc0)={0x40, 0x1a, 0x2, 0x1}, &(0x7f0000000d00)={0x40, 0x1c, 0x1, 0x81}, &(0x7f0000000d40)={0x40, 0x1e, 0x1, 0x6}, &(0x7f0000000d80)={0x40, 0x21, 0x1, 0x7f}}) 20:10:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x4, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1098.878305][T18989] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1098.894691][T18993] loop0: detected capacity change from 0 to 24 [ 1098.905448][T18993] FAULT_INJECTION: forcing a failure. [ 1098.905448][T18993] name failslab, interval 1, probability 0, space 0, times 0 20:10:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x5, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1098.921908][T18993] CPU: 0 PID: 18993 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1098.932377][T18993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1098.942474][T18993] Call Trace: [ 1098.945871][T18993] [ 1098.948827][T18993] dump_stack_lvl+0x125/0x1b0 [ 1098.953544][T18993] should_fail_ex+0x496/0x5b0 [ 1098.958266][T18993] should_failslab+0x9/0x20 [ 1098.962822][T18993] kmem_cache_alloc+0x33a/0x3b0 [ 1098.965428][T18989] team381: entered promiscuous mode [ 1098.967694][T18993] security_inode_alloc+0x38/0x180 [ 1098.967735][T18993] inode_init_always+0xbef/0xee0 [ 1098.967760][T18993] alloc_inode+0x7a/0x220 [ 1098.987354][T18993] new_inode+0x22/0x260 [ 1098.990732][T18989] 8021q: adding VLAN 0 to HW filter on device team381 [ 1098.991532][T18993] __ext4_new_inode+0x36f/0x5660 [ 1098.991566][T18993] ? tomoyo_path_number_perm+0x190/0x590 [ 1099.008924][T18993] ? ext4_fname_setup_filename+0x120/0x120 [ 1099.014786][T18993] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1099.020363][T18993] ? __dquot_initialize+0x299/0xc40 [ 1099.025614][T18993] ext4_mkdir+0x284/0xb70 [ 1099.029973][T18993] ? generic_permission+0x230/0x6a0 [ 1099.035191][T18993] ? ext4_init_new_dir+0x4c0/0x4c0 [ 1099.040340][T18993] ? security_inode_permission+0xd8/0x100 [ 1099.046091][T18993] ? inode_permission+0xdd/0x5e0 [ 1099.051037][T18993] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 1099.056075][T18993] vfs_mkdir+0x532/0x7e0 [ 1099.060337][T18993] do_mkdirat+0x2a9/0x330 [ 1099.064689][T18993] ? __ia32_sys_mknod+0xb0/0xb0 [ 1099.069562][T18993] ? getname_flags.part.0+0x1d5/0x4d0 [ 1099.074950][T18993] __x64_sys_mkdirat+0x115/0x170 [ 1099.079935][T18993] do_syscall_64+0x38/0xb0 [ 1099.084391][T18993] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1099.090342][T18993] RIP: 0033:0x7ffba087b5e7 [ 1099.094773][T18993] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1099.114413][T18993] RSP: 002b:00007ffba159aee8 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 20:10:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x6, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1099.122852][T18993] RAX: ffffffffffffffda RBX: 0000000020004400 RCX: 00007ffba087b5e7 [ 1099.130841][T18993] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 1099.138833][T18993] RBP: 0000000020000140 R08: 0000000000000000 R09: 000000000000015a [ 1099.146820][T18993] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1099.154811][T18993] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1099.162849][T18993] [ 1099.163487][T18989] gre313: entered promiscuous mode 20:10:29 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 56) [ 1099.200854][T18989] team381: Port device gre313 added [ 1099.212988][T18996] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:10:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x7, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:29 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xf2000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1099.272200][T19007] loop0: detected capacity change from 0 to 24 [ 1099.300028][T19007] FAULT_INJECTION: forcing a failure. [ 1099.300028][T19007] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.313681][T19007] CPU: 0 PID: 19007 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1099.324113][T19007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1099.324513][T18996] team393: entered promiscuous mode [ 1099.334161][T19007] Call Trace: [ 1099.334171][T19007] [ 1099.334178][T19007] dump_stack_lvl+0x125/0x1b0 [ 1099.334210][T19007] should_fail_ex+0x496/0x5b0 [ 1099.334241][T19007] should_failslab+0x9/0x20 [ 1099.339889][T18996] 8021q: adding VLAN 0 to HW filter on device team393 [ 1099.342709][T19007] kmem_cache_alloc+0x33a/0x3b0 [ 1099.342745][T19007] ? preempt_count_sub+0x150/0x150 [ 1099.363306][T19011] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1099.366441][T19007] jbd2__journal_start+0x190/0x690 [ 1099.366485][T19007] ? __ext4_new_inode+0x2e77/0x5660 [ 1099.377365][ T6580] usb 5-1: new high-speed USB device number 46 using dummy_hcd [ 1099.378302][T19007] __ext4_journal_start_sb+0x40f/0x5c0 [ 1099.400359][T19011] team382: entered promiscuous mode [ 1099.405364][T19007] __ext4_new_inode+0x2e77/0x5660 [ 1099.405413][T19007] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1099.411283][T19011] 8021q: adding VLAN 0 to HW filter on device team382 [ 1099.416020][T19007] ? __dquot_initialize+0x299/0xc40 [ 1099.416078][T19007] ext4_mkdir+0x284/0xb70 [ 1099.443071][T19007] ? generic_permission+0x230/0x6a0 [ 1099.446512][T19003] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1099.448267][T19007] ? ext4_init_new_dir+0x4c0/0x4c0 [ 1099.448297][T19007] ? security_inode_permission+0xd8/0x100 [ 1099.448329][T19007] ? inode_permission+0xdd/0x5e0 [ 1099.448348][T19007] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 1099.467253][T19003] team388: entered promiscuous mode [ 1099.468322][T19007] vfs_mkdir+0x532/0x7e0 [ 1099.468352][T19007] do_mkdirat+0x2a9/0x330 [ 1099.468382][T19007] ? __ia32_sys_mknod+0xb0/0xb0 [ 1099.468406][T19007] ? getname_flags.part.0+0x1d5/0x4d0 [ 1099.468427][T19007] __x64_sys_mkdirat+0x115/0x170 [ 1099.468450][T19007] do_syscall_64+0x38/0xb0 [ 1099.468471][T19007] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1099.468491][T19007] RIP: 0033:0x7ffba087b5e7 [ 1099.468506][T19007] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1099.468524][T19007] RSP: 002b:00007ffba159aee8 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1099.468542][T19007] RAX: ffffffffffffffda RBX: 0000000020004400 RCX: 00007ffba087b5e7 [ 1099.468555][T19007] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 1099.468567][T19007] RBP: 0000000020000140 R08: 0000000000000000 R09: 000000000000015a [ 1099.468579][T19007] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1099.468591][T19007] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1099.484861][T19003] 8021q: adding VLAN 0 to HW filter on device team388 [ 1099.487919][T19007] [ 1099.502064][T19007] EXT4-fs error (device sda1) in __ext4_new_inode:1083: Out of memory [ 1099.790656][T18991] gre318: entered promiscuous mode [ 1099.808438][T18991] team388: Port device gre318 added [ 1099.817630][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1099.829251][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 20:10:30 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xc8620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x8, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:30 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xf6604fa5, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:30 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xdf720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:30 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 57) [ 1099.843967][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1099.882057][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1099.905538][ T6580] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1099.907573][T19019] loop0: detected capacity change from 0 to 24 [ 1099.919006][ T6580] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1099.945051][ T6580] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1099.955811][T19019] FAULT_INJECTION: forcing a failure. [ 1099.955811][T19019] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.958303][ T6580] usb 5-1: config 0 descriptor?? [ 1099.976620][T19019] CPU: 0 PID: 19019 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1099.977143][T19022] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1099.987071][T19019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1099.987093][T19019] Call Trace: [ 1099.987101][T19019] [ 1099.987109][T19019] dump_stack_lvl+0x125/0x1b0 [ 1099.987138][T19019] should_fail_ex+0x496/0x5b0 [ 1099.987167][T19019] should_failslab+0x9/0x20 [ 1099.987194][T19019] kmem_cache_alloc+0x33a/0x3b0 [ 1099.987217][T19019] ? preempt_count_sub+0x150/0x150 [ 1099.987251][T19019] jbd2__journal_start+0x190/0x690 [ 1099.987285][T19019] ? __ext4_new_inode+0x2e77/0x5660 [ 1099.987308][T19019] __ext4_journal_start_sb+0x40f/0x5c0 [ 1099.987343][T19019] __ext4_new_inode+0x2e77/0x5660 [ 1099.987380][T19019] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1099.987401][T19019] ? __dquot_initialize+0x299/0xc40 [ 1099.987445][T19019] ext4_mkdir+0x284/0xb70 [ 1099.987473][T19019] ? generic_permission+0x230/0x6a0 [ 1099.987493][T19019] ? ext4_init_new_dir+0x4c0/0x4c0 [ 1099.987516][T19019] ? security_inode_permission+0xd8/0x100 [ 1099.987551][T19019] ? inode_permission+0xdd/0x5e0 [ 1099.987568][T19019] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 1099.987592][T19019] vfs_mkdir+0x532/0x7e0 [ 1099.987616][T19019] do_mkdirat+0x2a9/0x330 [ 1099.987640][T19019] ? __ia32_sys_mknod+0xb0/0xb0 [ 1099.987665][T19019] ? getname_flags.part.0+0x1d5/0x4d0 [ 1099.987689][T19019] __x64_sys_mkdirat+0x115/0x170 [ 1099.987713][T19019] do_syscall_64+0x38/0xb0 [ 1099.987737][T19019] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1099.987759][T19019] RIP: 0033:0x7ffba087b5e7 [ 1099.987777][T19019] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1099.987796][T19019] RSP: 002b:00007ffba159aee8 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1099.987817][T19019] RAX: ffffffffffffffda RBX: 0000000020004400 RCX: 00007ffba087b5e7 [ 1099.987830][T19019] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 1099.987843][T19019] RBP: 0000000020000140 R08: 0000000000000000 R09: 000000000000015a [ 1099.987855][T19019] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1099.987868][T19019] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1099.987902][T19019] [ 1099.988551][T19019] EXT4-fs error (device sda1) in __ext4_new_inode:1083: Out of memory [ 1100.022627][T19022] team383: entered promiscuous mode [ 1100.229871][T19022] 8021q: adding VLAN 0 to HW filter on device team383 [ 1100.247772][T19024] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1100.287156][T19024] team394: entered promiscuous mode [ 1100.300089][T19024] 8021q: adding VLAN 0 to HW filter on device team394 [ 1100.447165][T19020] gre321: entered promiscuous mode [ 1100.463878][T19020] team394: Port device gre321 added [ 1100.494482][T18995] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1100.507567][T18995] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1100.564131][T19017] gre314: entered promiscuous mode [ 1100.571596][T19017] team383: Port device gre314 added [ 1100.577089][T19025] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1100.605068][T19025] team389: entered promiscuous mode [ 1100.611437][T19025] 8021q: adding VLAN 0 to HW filter on device team389 [ 1100.782492][T18995] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1100.791063][T18995] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1100.800554][T18995] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1100.809867][T18995] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1100.897697][ T6580] usbhid 5-1:0.0: can't add hid device: -71 [ 1100.903832][ T6580] usbhid: probe of 5-1:0.0 failed with error -71 [ 1100.912420][ T6580] usb 5-1: USB disconnect, device number 46 20:10:31 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) fanotify_mark(0xffffffffffffffff, 0xe2ea3009931fb5a2, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) r1 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) (rerun: 64) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_disconnect(r1) (async) syz_usb_control_io$hid(r1, &(0x7f0000000200)={0x24, &(0x7f0000000380)={0x0, 0x22, 0x81, {0x81, 0x11, "e196eb6c6a576f6f394ca9bcd55f99084b7a6741a0e8d747f47ad7ca207438bc09a3f3a2c3fecad1e0f15f70e3b71dd2e7423996b69506d395f5feff7c026870886e9eb745f5ccffedc614f59c823f8a8ae00fdf41fa02ae1f12993f92ed3adb4900d668c927d730f6b5885849ee3d2eb7249ee37500f0e3fb94e4d5246c01"}}, &(0x7f0000000440)={0x0, 0x3, 0xaf, @string={0xaf, 0x3, "ed845b1ab9a60f6ed9e6b957c78d33a7e53f0809a55f79ab265874d1166236072ad2d9035b69f0aa24a5570548d358a9d56bdd66256b15ebf90f5b92ede88185ceb20c00cb235e12c4f46f126c7faa09139cd884f4c5b0fbe9fb8c5b61583a5894fb6ac6dd13db71f52e23db76493e1057c66cebd96448223754ddd9d5b1424a32a0d9e2fb45ba108f9e45269c3630dbad6590042ca802b6a62a88e71b3e7f6683e592cac6902f6e492d550da3"}}, &(0x7f0000000140)={0x0, 0x22, 0x23, {[@local=@item_012={0x2, 0x2, 0x0, "9f5a"}, @local=@item_012={0x1, 0x2, 0x9, 'S'}, @global=@item_4={0x3, 0x1, 0x4, "9baee853"}, @local=@item_4={0x3, 0x2, 0x1, 'gY|A'}, @local=@item_4={0x3, 0x2, 0x0, "5da40ef7"}, @local=@item_4={0x3, 0x2, 0x0, "2b144abd"}, @main=@item_4={0x3, 0x0, 0xb, "8b0c1205"}, @global=@item_4={0x3, 0x1, 0x6, "b0102f78"}]}}, &(0x7f0000000180)={0x0, 0x21, 0x9, {0x9, 0x21, 0xfffe, 0x9, 0x1, {0x22, 0xf19}}}}, &(0x7f0000000700)={0x2c, &(0x7f0000000500)={0x20, 0xd, 0xaa, "127721eb3acfa41ee3e0ea112c72d2b2ba5bb49c50814189334a2f42cb8c9c4a35163c09574942788c107acaa8efab3c10ccde0f2864af61d9f3ed15c4909c7877e6eea4849b795865ef8d7af0d127cdedc2198c6b44cc3cb1a4c7ac14bfa152bbc5f8cb1fdf1b4d938d5040202b1ab72dadf071a6537d3e8046cf7d8041198b1758cae1464b2260302e0e250f15d6727613662b355b1f7266aebef19c7a199babe758a528a065c5a3d4"}, &(0x7f00000005c0)={0x0, 0xa, 0x1, 0x7}, &(0x7f0000000600)={0x0, 0x8, 0x1, 0x81}, &(0x7f0000000640)={0x20, 0x1, 0x6d, "5bfc403f20e3cb9cea1ed8f24b2f8b50317766209c6c686c58aea716b22e02d32977d6f35b7d65512108a277cc90a46195c22ce5b2bf4e8ab197cbde6988736f1bba8777a0afffc942939b2eaeabb87e30ab9c1244f18da75bf60fa6d1ad42b30cfdfeb1ceec6b616b2375373b"}, &(0x7f00000006c0)={0x20, 0x3, 0x1, 0xe4}}) (async) socket$inet(0x10, 0x80803, 0x4000000000000004) r2 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) (async) r3 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) (async) sendmsg(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc4114ef582eb3412a6a4a363181180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6a", 0x4c}], 0x1}, 0x0) r4 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r4, 0x82, 0x0, 0x0) (async) r5 = socket$inet6(0xa, 0x6, 0x0) listen(r5, 0x0) (async, rerun: 64) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01", @ANYRESOCT=r5, @ANYBLOB="615dcd92a27ec0b02a1a4c3a0238b03dd9e28b99b646d016324336df9efda43a7cfb320794118254f5fe644388b14b9e5ac8ef0de5ab3e4b714050c4ece6555c7346c7a1443751e942"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async, rerun: 64) r6 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r6, 0x82, 0x0, 0x0) syz_usb_control_io(r6, &(0x7f0000000980)={0x2c, &(0x7f0000000740)={0x0, 0x21, 0xa4, {0xa4, 0x20, "bec3a148570776d5c8ace17a005ccd33cbe93e05f58973f83d78a9eca1b258dbb16d22f575280e719bc6cc0374f0f218fc0be116a15a869f9a6738294748c0dbb9b91146985df52030f2f9ba33d1cb04017fe07ed2c5a56c8221e8fc9f4313a0920ed96e24f01c28f27a8751287c8ca597ce788bfc0f12df397f2dade9d0c9ea0fdcecdc01b7aaeb0b976ded38ebfbf62cadc56f8d8a0c67b904fa42fde6666a7b46"}}, &(0x7f0000000800)={0x0, 0x3, 0x79, @string={0x79, 0x3, "9328c24e425dd06a8758ace6bc9a9aa6e6196488df2c15b162aa0cc0cb90c22944be446496050c31a59b572bccf3892009d5428e597afb0c343fba54339948e666babfa14eb38b21338d0a1a917b7c2ef1ac44eb9bf48c3de8465645924ea2ebe89d9be8e3c242cd4ba80698cffdb178a48278a5b037f7"}}, &(0x7f0000000880)={0x0, 0xf, 0x3c, {0x5, 0xf, 0x3c, 0x5, [@ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x8, 0x8, 0x2, 0x9}, @wireless={0xb, 0x10, 0x1, 0x4, 0x88, 0x0, 0x8, 0x7, 0x8f}, @ss_container_id={0x14, 0x10, 0x4, 0x1, "5dd50cd3bc9add9524083a3db2e08afb"}, @wireless={0xb, 0x10, 0x1, 0xc, 0xe0, 0x7, 0x0, 0x1c1e, 0x4}]}}, &(0x7f0000000900)={0x20, 0x29, 0xf, {0xf, 0x29, 0x8e, 0x2, 0x0, 0x5, "31a1fbf7", "77900ae0"}}, &(0x7f0000000940)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x5, 0x4, 0x0, 0x9, 0x80, 0x6, 0x8}}}, &(0x7f0000000dc0)={0x84, &(0x7f00000009c0)={0x40, 0x11, 0x20, "aeccfa97ca25de43485ed3a6553fd867eaf1af2e421a76e6c2cb035fd99b1421"}, &(0x7f0000000a00)={0x0, 0xa, 0x1, 0x1f}, &(0x7f0000000a40)={0x0, 0x8, 0x1, 0x3d}, &(0x7f0000000a80)={0x20, 0x0, 0x4}, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2000270000000020000000d47a00"], &(0x7f0000000b00)={0x40, 0x7, 0x2, 0x3dd}, &(0x7f0000000b40)={0x40, 0x9, 0x1, 0x1f}, &(0x7f0000000b80)={0x40, 0xb, 0x2, 'v!'}, &(0x7f0000000bc0)={0x40, 0xf, 0x2, 0x5}, &(0x7f0000000c00)={0x40, 0x13, 0x6, @multicast}, &(0x7f0000000c40)={0x40, 0x17, 0x6, @multicast}, &(0x7f0000000c80)={0x40, 0x19, 0x2, "1430"}, &(0x7f0000000cc0)={0x40, 0x1a, 0x2, 0x1}, &(0x7f0000000d00)={0x40, 0x1c, 0x1, 0x81}, &(0x7f0000000d40)={0x40, 0x1e, 0x1, 0x6}, &(0x7f0000000d80)={0x40, 0x21, 0x1, 0x7f}}) 20:10:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xa, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:31 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 58) 20:10:31 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe0720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:31 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xfeff0000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:31 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xc9620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1101.359165][T19033] loop0: detected capacity change from 0 to 24 [ 1101.362218][T19034] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1101.374466][T19033] FAULT_INJECTION: forcing a failure. [ 1101.374466][T19033] name failslab, interval 1, probability 0, space 0, times 0 [ 1101.386930][T19034] team390: entered promiscuous mode [ 1101.393543][T19033] CPU: 0 PID: 19033 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1101.403988][T19033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1101.414044][T19033] Call Trace: [ 1101.417326][T19033] [ 1101.420262][T19033] dump_stack_lvl+0x125/0x1b0 [ 1101.424944][T19033] should_fail_ex+0x496/0x5b0 [ 1101.429624][T19033] should_failslab+0x9/0x20 [ 1101.434129][T19033] __kmem_cache_alloc_node+0x2fd/0x350 [ 1101.439617][T19033] ? ext4_find_extent+0x958/0xce0 [ 1101.444652][T19033] ? ext4_find_extent+0x958/0xce0 [ 1101.449678][T19033] __kmalloc+0x4c/0x100 [ 1101.453838][T19033] ext4_find_extent+0x958/0xce0 [ 1101.458700][T19033] ext4_ext_map_blocks+0x26b/0x5b00 [ 1101.463907][T19033] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1101.469892][T19033] ? print_usage_bug.part.0+0x670/0x670 [ 1101.475438][T19033] ? jbd2_journal_dirty_metadata+0x1c3/0xd50 [ 1101.481427][T19033] ? ext4_inode_csum_set+0x294/0x360 [ 1101.486713][T19033] ? ext4_ext_release+0x10/0x10 [ 1101.491570][T19033] ? lock_sync+0x190/0x190 [ 1101.495991][T19033] ? reacquire_held_locks+0x4b0/0x4b0 [ 1101.501372][T19033] ? preempt_count_sub+0x150/0x150 [ 1101.506497][T19033] ? ext4_es_lookup_extent+0xc7/0xbf0 [ 1101.511871][T19033] ext4_map_blocks+0x844/0x1770 [ 1101.516729][T19033] ? ext4_issue_zeroout+0x1f0/0x1f0 [ 1101.521955][T19033] ? __brelse+0x88/0xa0 [ 1101.526133][T19033] ext4_append+0x1fb/0x560 [ 1101.530553][T19033] ? ext4_match+0x650/0x650 [ 1101.535051][T19033] ? __dquot_initialize+0x299/0xc40 [ 1101.540254][T19033] ext4_init_new_dir+0x220/0x4c0 [ 1101.545190][T19033] ? ext4_init_dot_dotdot+0x560/0x560 [ 1101.550565][T19033] ext4_mkdir+0x316/0xb70 [ 1101.554898][T19033] ? generic_permission+0x230/0x6a0 [ 1101.560090][T19033] ? ext4_init_new_dir+0x4c0/0x4c0 [ 1101.565198][T19033] ? security_inode_permission+0xd8/0x100 [ 1101.570922][T19033] ? inode_permission+0xdd/0x5e0 [ 1101.575852][T19033] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 1101.580869][T19033] vfs_mkdir+0x532/0x7e0 [ 1101.585108][T19033] do_mkdirat+0x2a9/0x330 [ 1101.589438][T19033] ? __ia32_sys_mknod+0xb0/0xb0 [ 1101.594291][T19033] ? getname_flags.part.0+0x1d5/0x4d0 [ 1101.599657][T19033] __x64_sys_mkdirat+0x115/0x170 [ 1101.604592][T19033] do_syscall_64+0x38/0xb0 [ 1101.609006][T19033] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1101.614903][T19033] RIP: 0033:0x7ffba087b5e7 [ 1101.619316][T19033] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1101.638934][T19033] RSP: 002b:00007ffba159aee8 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1101.647350][T19033] RAX: ffffffffffffffda RBX: 0000000020004400 RCX: 00007ffba087b5e7 20:10:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xe, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1101.655320][T19033] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 1101.663289][T19033] RBP: 0000000020000140 R08: 0000000000000000 R09: 000000000000015a [ 1101.671254][T19033] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1101.679215][T19033] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1101.687188][T19033] [ 1101.702711][T19034] 8021q: adding VLAN 0 to HW filter on device team390 20:10:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x11, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:32 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 59) [ 1101.731535][T19039] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1101.794638][T19039] team395: entered promiscuous mode [ 1101.805658][T19039] 8021q: adding VLAN 0 to HW filter on device team395 [ 1101.814854][T19049] loop0: detected capacity change from 0 to 24 [ 1101.825288][T19049] FAULT_INJECTION: forcing a failure. [ 1101.825288][T19049] name failslab, interval 1, probability 0, space 0, times 0 20:10:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x14, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1101.829754][T19041] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1101.844644][T19049] CPU: 1 PID: 19049 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1101.857365][ T5045] usb 5-1: new high-speed USB device number 47 using dummy_hcd [ 1101.857591][T19049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1101.874574][T19041] team384: entered promiscuous mode [ 1101.875230][T19049] Call Trace: [ 1101.875238][T19049] [ 1101.875245][T19049] dump_stack_lvl+0x125/0x1b0 [ 1101.880742][T19041] 8021q: adding VLAN 0 to HW filter on device team384 [ 1101.883692][T19049] should_fail_ex+0x496/0x5b0 [ 1101.883734][T19049] should_failslab+0x9/0x20 [ 1101.908015][T19049] __kmem_cache_alloc_node+0x2fd/0x350 [ 1101.913473][T19049] ? ext4_find_extent+0x958/0xce0 [ 1101.918503][T19049] ? ext4_find_extent+0x958/0xce0 [ 1101.923524][T19049] __kmalloc+0x4c/0x100 [ 1101.927677][T19049] ext4_find_extent+0x958/0xce0 [ 1101.932534][T19049] ext4_ext_map_blocks+0x26b/0x5b00 [ 1101.937739][T19049] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1101.943720][T19049] ? print_usage_bug.part.0+0x670/0x670 [ 1101.949260][T19049] ? jbd2_journal_dirty_metadata+0x1c3/0xd50 [ 1101.955242][T19049] ? ext4_inode_csum_set+0x294/0x360 [ 1101.960525][T19049] ? ext4_ext_release+0x10/0x10 [ 1101.965378][T19049] ? lock_sync+0x190/0x190 [ 1101.969792][T19049] ? reacquire_held_locks+0x4b0/0x4b0 [ 1101.975158][T19049] ? preempt_count_sub+0x150/0x150 [ 1101.980275][T19049] ? ext4_es_lookup_extent+0xc7/0xbf0 [ 1101.985642][T19049] ext4_map_blocks+0x844/0x1770 [ 1101.990496][T19049] ? ext4_issue_zeroout+0x1f0/0x1f0 [ 1101.995690][T19049] ? __brelse+0x88/0xa0 [ 1101.999855][T19049] ext4_append+0x1fb/0x560 [ 1102.004362][T19049] ? ext4_match+0x650/0x650 [ 1102.008862][T19049] ? __dquot_initialize+0x299/0xc40 [ 1102.014070][T19049] ext4_init_new_dir+0x220/0x4c0 [ 1102.019008][T19049] ? ext4_init_dot_dotdot+0x560/0x560 [ 1102.024383][T19049] ext4_mkdir+0x316/0xb70 [ 1102.028721][T19049] ? generic_permission+0x230/0x6a0 [ 1102.033919][T19049] ? ext4_init_new_dir+0x4c0/0x4c0 [ 1102.039028][T19049] ? security_inode_permission+0xd8/0x100 [ 1102.044749][T19049] ? inode_permission+0xdd/0x5e0 [ 1102.049679][T19049] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 1102.054700][T19049] vfs_mkdir+0x532/0x7e0 [ 1102.058939][T19049] do_mkdirat+0x2a9/0x330 [ 1102.063262][T19049] ? __ia32_sys_mknod+0xb0/0xb0 [ 1102.068111][T19049] ? getname_flags.part.0+0x1d5/0x4d0 [ 1102.073484][T19049] __x64_sys_mkdirat+0x115/0x170 [ 1102.078420][T19049] do_syscall_64+0x38/0xb0 [ 1102.082832][T19049] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1102.088721][T19049] RIP: 0033:0x7ffba087b5e7 [ 1102.093131][T19049] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1102.112729][T19049] RSP: 002b:00007ffba159aee8 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1102.121144][T19049] RAX: ffffffffffffffda RBX: 0000000020004400 RCX: 00007ffba087b5e7 [ 1102.129109][T19049] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 1102.137072][T19049] RBP: 0000000020000140 R08: 0000000000000000 R09: 000000000000015a 20:10:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x28, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1102.145034][T19049] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1102.152997][T19049] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1102.160971][T19049] 20:10:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x36, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1102.304056][T19042] gre319: entered promiscuous mode [ 1102.315527][T19042] team390: Port device gre319 added [ 1102.436523][T19037] gre315: entered promiscuous mode [ 1102.445231][T19037] team384: Port device gre315 added [ 1102.487571][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1102.504757][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1102.515243][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1102.530832][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1102.541389][ T5045] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1102.552525][T19045] gre322: entered promiscuous mode [ 1102.561216][ T5045] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1102.561245][ T5045] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1102.578706][ T5045] usb 5-1: config 0 descriptor?? [ 1102.585641][T19045] team395: Port device gre322 added [ 1102.825480][T19057] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1102.834377][T19057] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1102.847182][T19057] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1102.856127][T19057] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1102.867546][T19057] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 20:10:33 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) fanotify_mark(0xffffffffffffffff, 0xe2ea3009931fb5a2, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_disconnect(r1) (async) syz_usb_control_io$hid(r1, &(0x7f0000000200)={0x24, &(0x7f0000000380)={0x0, 0x22, 0x81, {0x81, 0x11, "e196eb6c6a576f6f394ca9bcd55f99084b7a6741a0e8d747f47ad7ca207438bc09a3f3a2c3fecad1e0f15f70e3b71dd2e7423996b69506d395f5feff7c026870886e9eb745f5ccffedc614f59c823f8a8ae00fdf41fa02ae1f12993f92ed3adb4900d668c927d730f6b5885849ee3d2eb7249ee37500f0e3fb94e4d5246c01"}}, &(0x7f0000000440)={0x0, 0x3, 0xaf, @string={0xaf, 0x3, "ed845b1ab9a60f6ed9e6b957c78d33a7e53f0809a55f79ab265874d1166236072ad2d9035b69f0aa24a5570548d358a9d56bdd66256b15ebf90f5b92ede88185ceb20c00cb235e12c4f46f126c7faa09139cd884f4c5b0fbe9fb8c5b61583a5894fb6ac6dd13db71f52e23db76493e1057c66cebd96448223754ddd9d5b1424a32a0d9e2fb45ba108f9e45269c3630dbad6590042ca802b6a62a88e71b3e7f6683e592cac6902f6e492d550da3"}}, &(0x7f0000000140)={0x0, 0x22, 0x23, {[@local=@item_012={0x2, 0x2, 0x0, "9f5a"}, @local=@item_012={0x1, 0x2, 0x9, 'S'}, @global=@item_4={0x3, 0x1, 0x4, "9baee853"}, @local=@item_4={0x3, 0x2, 0x1, 'gY|A'}, @local=@item_4={0x3, 0x2, 0x0, "5da40ef7"}, @local=@item_4={0x3, 0x2, 0x0, "2b144abd"}, @main=@item_4={0x3, 0x0, 0xb, "8b0c1205"}, @global=@item_4={0x3, 0x1, 0x6, "b0102f78"}]}}, &(0x7f0000000180)={0x0, 0x21, 0x9, {0x9, 0x21, 0xfffe, 0x9, 0x1, {0x22, 0xf19}}}}, &(0x7f0000000700)={0x2c, &(0x7f0000000500)={0x20, 0xd, 0xaa, "127721eb3acfa41ee3e0ea112c72d2b2ba5bb49c50814189334a2f42cb8c9c4a35163c09574942788c107acaa8efab3c10ccde0f2864af61d9f3ed15c4909c7877e6eea4849b795865ef8d7af0d127cdedc2198c6b44cc3cb1a4c7ac14bfa152bbc5f8cb1fdf1b4d938d5040202b1ab72dadf071a6537d3e8046cf7d8041198b1758cae1464b2260302e0e250f15d6727613662b355b1f7266aebef19c7a199babe758a528a065c5a3d4"}, &(0x7f00000005c0)={0x0, 0xa, 0x1, 0x7}, &(0x7f0000000600)={0x0, 0x8, 0x1, 0x81}, &(0x7f0000000640)={0x20, 0x1, 0x6d, "5bfc403f20e3cb9cea1ed8f24b2f8b50317766209c6c686c58aea716b22e02d32977d6f35b7d65512108a277cc90a46195c22ce5b2bf4e8ab197cbde6988736f1bba8777a0afffc942939b2eaeabb87e30ab9c1244f18da75bf60fa6d1ad42b30cfdfeb1ceec6b616b2375373b"}, &(0x7f00000006c0)={0x20, 0x3, 0x1, 0xe4}}) (async) socket$inet(0x10, 0x80803, 0x4000000000000004) (async) r2 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) r3 = socket$inet(0x10, 0x80803, 0x4000000000000004) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b07988100", 0x4c}], 0x1}, 0x0) (async) sendmsg(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="4c0000001300ff09fffd956fa283b700008c001f0000000002007d3540150024001d001fc4114ef582eb3412a6a4a363181180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6a", 0x4c}], 0x1}, 0x0) r4 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r4, 0x82, 0x0, 0x0) (async) r5 = socket$inet6(0xa, 0x6, 0x0) listen(r5, 0x0) (async) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01", @ANYRESOCT=r5, @ANYBLOB="615dcd92a27ec0b02a1a4c3a0238b03dd9e28b99b646d016324336df9efda43a7cfb320794118254f5fe644388b14b9e5ac8ef0de5ab3e4b714050c4ece6555c7346c7a1443751e942"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) r6 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r6, 0x82, 0x0, 0x0) (async) syz_usb_control_io(r6, &(0x7f0000000980)={0x2c, &(0x7f0000000740)={0x0, 0x21, 0xa4, {0xa4, 0x20, "bec3a148570776d5c8ace17a005ccd33cbe93e05f58973f83d78a9eca1b258dbb16d22f575280e719bc6cc0374f0f218fc0be116a15a869f9a6738294748c0dbb9b91146985df52030f2f9ba33d1cb04017fe07ed2c5a56c8221e8fc9f4313a0920ed96e24f01c28f27a8751287c8ca597ce788bfc0f12df397f2dade9d0c9ea0fdcecdc01b7aaeb0b976ded38ebfbf62cadc56f8d8a0c67b904fa42fde6666a7b46"}}, &(0x7f0000000800)={0x0, 0x3, 0x79, @string={0x79, 0x3, "9328c24e425dd06a8758ace6bc9a9aa6e6196488df2c15b162aa0cc0cb90c22944be446496050c31a59b572bccf3892009d5428e597afb0c343fba54339948e666babfa14eb38b21338d0a1a917b7c2ef1ac44eb9bf48c3de8465645924ea2ebe89d9be8e3c242cd4ba80698cffdb178a48278a5b037f7"}}, &(0x7f0000000880)={0x0, 0xf, 0x3c, {0x5, 0xf, 0x3c, 0x5, [@ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x8, 0x8, 0x2, 0x9}, @wireless={0xb, 0x10, 0x1, 0x4, 0x88, 0x0, 0x8, 0x7, 0x8f}, @ss_container_id={0x14, 0x10, 0x4, 0x1, "5dd50cd3bc9add9524083a3db2e08afb"}, @wireless={0xb, 0x10, 0x1, 0xc, 0xe0, 0x7, 0x0, 0x1c1e, 0x4}]}}, &(0x7f0000000900)={0x20, 0x29, 0xf, {0xf, 0x29, 0x8e, 0x2, 0x0, 0x5, "31a1fbf7", "77900ae0"}}, &(0x7f0000000940)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x5, 0x4, 0x0, 0x9, 0x80, 0x6, 0x8}}}, &(0x7f0000000dc0)={0x84, &(0x7f00000009c0)={0x40, 0x11, 0x20, "aeccfa97ca25de43485ed3a6553fd867eaf1af2e421a76e6c2cb035fd99b1421"}, &(0x7f0000000a00)={0x0, 0xa, 0x1, 0x1f}, &(0x7f0000000a40)={0x0, 0x8, 0x1, 0x3d}, &(0x7f0000000a80)={0x20, 0x0, 0x4}, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2000270000000020000000d47a00"], &(0x7f0000000b00)={0x40, 0x7, 0x2, 0x3dd}, &(0x7f0000000b40)={0x40, 0x9, 0x1, 0x1f}, &(0x7f0000000b80)={0x40, 0xb, 0x2, 'v!'}, &(0x7f0000000bc0)={0x40, 0xf, 0x2, 0x5}, &(0x7f0000000c00)={0x40, 0x13, 0x6, @multicast}, &(0x7f0000000c40)={0x40, 0x17, 0x6, @multicast}, &(0x7f0000000c80)={0x40, 0x19, 0x2, "1430"}, &(0x7f0000000cc0)={0x40, 0x1a, 0x2, 0x1}, &(0x7f0000000d00)={0x40, 0x1c, 0x1, 0x81}, &(0x7f0000000d40)={0x40, 0x1e, 0x1, 0x6}, &(0x7f0000000d80)={0x40, 0x21, 0x1, 0x7f}}) 20:10:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x60, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:33 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xca620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:33 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 60) 20:10:33 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xfeffffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:33 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe1720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1102.876178][T19057] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1102.884718][T19057] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1102.893283][T19057] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1102.901794][T19057] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1102.910474][T19057] misc raw-gadget: fail, usb_gadget_register_driver returned -16 20:10:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xe0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1102.976622][T19061] team391: entered promiscuous mode [ 1102.978693][T19068] loop0: detected capacity change from 0 to 24 [ 1102.988897][T19061] 8021q: adding VLAN 0 to HW filter on device team391 [ 1103.002945][T19068] FAULT_INJECTION: forcing a failure. [ 1103.002945][T19068] name failslab, interval 1, probability 0, space 0, times 0 [ 1103.017523][ T5045] usbhid 5-1:0.0: can't add hid device: -71 [ 1103.025422][ T5045] usbhid: probe of 5-1:0.0 failed with error -71 [ 1103.026317][T19066] team396: entered promiscuous mode [ 1103.042839][T19066] 8021q: adding VLAN 0 to HW filter on device team396 [ 1103.049011][ T5045] usb 5-1: USB disconnect, device number 47 [ 1103.061746][T19068] CPU: 0 PID: 19068 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1103.072221][T19068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1103.079291][T19072] team385: entered promiscuous mode [ 1103.082276][T19068] Call Trace: [ 1103.082288][T19068] [ 1103.082295][T19068] dump_stack_lvl+0x125/0x1b0 [ 1103.082324][T19068] should_fail_ex+0x496/0x5b0 [ 1103.088009][T19072] 8021q: adding VLAN 0 to HW filter on device team385 [ 1103.090805][T19068] should_failslab+0x9/0x20 [ 1103.090841][T19068] kmem_cache_alloc+0x33a/0x3b0 [ 1103.119323][T19068] ? rcu_is_watching+0x12/0xb0 [ 1103.124813][T19068] ext4_mb_new_blocks+0x8f6/0x4af0 [ 1103.129947][T19068] ? kasan_set_track+0x25/0x30 [ 1103.134750][T19068] ? ext4_cache_extents+0x68/0x2d0 [ 1103.139908][T19068] ? ext4_discard_preallocations+0xfc0/0xfc0 [ 1103.145922][T19068] ? ext4_ext_search_right+0x2c7/0xb80 [ 1103.151421][T19068] ? ext4_inode_to_goal_block+0x348/0x450 [ 1103.157184][T19068] ext4_ext_map_blocks+0x1fd2/0x5b00 [ 1103.162518][T19068] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1103.168539][T19068] ? print_usage_bug.part.0+0x670/0x670 [ 1103.174126][T19068] ? __phys_addr+0xc6/0x140 [ 1103.178669][T19068] ? rcu_is_watching+0x12/0xb0 [ 1103.183465][T19068] ? ext4_ext_release+0x10/0x10 [ 1103.188354][T19068] ? lock_sync+0x190/0x190 [ 1103.192804][T19068] ? preempt_count_sub+0x150/0x150 [ 1103.197956][T19068] ? percpu_counter_add_batch+0x112/0x1f0 [ 1103.203704][T19068] ? lockdep_hardirqs_on+0x7d/0x100 [ 1103.208951][T19068] ? down_write_killable_nested+0x250/0x250 [ 1103.214872][T19068] ? ext4_es_lookup_extent+0xc7/0xbf0 [ 1103.220283][T19068] ext4_map_blocks+0x619/0x1770 [ 1103.225167][T19068] ? ext4_issue_zeroout+0x1f0/0x1f0 [ 1103.230411][T19068] ext4_getblk+0x17f/0x810 [ 1103.234882][T19068] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1103.240647][T19068] ? ext4_issue_zeroout+0x1f0/0x1f0 [ 1103.245894][T19068] ext4_bread+0x2c/0x190 [ 1103.250171][T19068] ext4_append+0x26d/0x560 [ 1103.254613][T19068] ? ext4_match+0x650/0x650 [ 1103.259146][T19068] ? __dquot_initialize+0x299/0xc40 [ 1103.264385][T19068] ext4_init_new_dir+0x220/0x4c0 [ 1103.269359][T19068] ? ext4_init_dot_dotdot+0x560/0x560 20:10:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1103.274763][T19068] ext4_mkdir+0x316/0xb70 [ 1103.279115][T19068] ? generic_permission+0x230/0x6a0 [ 1103.284337][T19068] ? ext4_init_new_dir+0x4c0/0x4c0 [ 1103.289466][T19068] ? security_inode_permission+0xd8/0x100 [ 1103.295222][T19068] ? inode_permission+0xdd/0x5e0 [ 1103.300179][T19068] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 1103.300421][T19071] gre320: entered promiscuous mode [ 1103.305207][T19068] vfs_mkdir+0x532/0x7e0 [ 1103.305238][T19068] do_mkdirat+0x2a9/0x330 [ 1103.305262][T19068] ? __ia32_sys_mknod+0xb0/0xb0 [ 1103.305286][T19068] ? getname_flags.part.0+0x1d5/0x4d0 [ 1103.305309][T19068] __x64_sys_mkdirat+0x115/0x170 [ 1103.305331][T19068] do_syscall_64+0x38/0xb0 [ 1103.305350][T19068] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1103.305368][T19068] RIP: 0033:0x7ffba087b5e7 [ 1103.305384][T19068] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1103.305400][T19068] RSP: 002b:00007ffba159aee8 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1103.305416][T19068] RAX: ffffffffffffffda RBX: 0000000020004400 RCX: 00007ffba087b5e7 [ 1103.305427][T19068] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 1103.305437][T19068] RBP: 0000000020000140 R08: 0000000000000000 R09: 000000000000015a [ 1103.305447][T19068] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1103.305457][T19068] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1103.305477][T19068] 20:10:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x3, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:33 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 61) [ 1103.444605][T19071] team391: Port device gre320 added 20:10:33 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xcb620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1103.529945][T19080] loop0: detected capacity change from 0 to 24 [ 1103.561365][T19080] FAULT_INJECTION: forcing a failure. [ 1103.561365][T19080] name failslab, interval 1, probability 0, space 0, times 0 [ 1103.575251][T19080] CPU: 0 PID: 19080 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1103.585703][T19080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1103.595777][T19080] Call Trace: [ 1103.599073][T19080] [ 1103.602015][T19080] dump_stack_lvl+0x125/0x1b0 [ 1103.606720][T19080] should_fail_ex+0x496/0x5b0 [ 1103.611434][T19080] should_failslab+0x9/0x20 [ 1103.615964][T19080] kmem_cache_alloc+0x33a/0x3b0 [ 1103.620832][T19080] ? rcu_is_watching+0x12/0xb0 [ 1103.625685][T19080] ext4_mb_new_blocks+0x8f6/0x4af0 [ 1103.630839][T19080] ? kasan_set_track+0x25/0x30 [ 1103.635983][T19080] ? ext4_cache_extents+0x68/0x2d0 [ 1103.641131][T19080] ? ext4_discard_preallocations+0xfc0/0xfc0 [ 1103.647140][T19080] ? ext4_ext_search_right+0x2c7/0xb80 [ 1103.652632][T19080] ? ext4_inode_to_goal_block+0x348/0x450 [ 1103.658397][T19080] ext4_ext_map_blocks+0x1fd2/0x5b00 [ 1103.663727][T19080] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1103.669744][T19080] ? print_usage_bug.part.0+0x670/0x670 [ 1103.674138][T19064] gre316: entered promiscuous mode [ 1103.675303][T19080] ? __phys_addr+0xc6/0x140 [ 1103.675338][T19080] ? rcu_is_watching+0x12/0xb0 [ 1103.675369][T19080] ? ext4_ext_release+0x10/0x10 [ 1103.675405][T19080] ? lock_sync+0x190/0x190 [ 1103.675431][T19080] ? preempt_count_sub+0x150/0x150 [ 1103.675455][T19080] ? percpu_counter_add_batch+0x112/0x1f0 [ 1103.675476][T19080] ? lockdep_hardirqs_on+0x7d/0x100 [ 1103.675502][T19080] ? down_write_killable_nested+0x250/0x250 [ 1103.675524][T19080] ? ext4_es_lookup_extent+0xc7/0xbf0 [ 1103.675546][T19080] ext4_map_blocks+0x619/0x1770 [ 1103.675572][T19080] ? ext4_issue_zeroout+0x1f0/0x1f0 [ 1103.737831][T19080] ext4_getblk+0x17f/0x810 [ 1103.742264][T19080] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1103.747984][T19080] ? ext4_issue_zeroout+0x1f0/0x1f0 [ 1103.753189][T19080] ext4_bread+0x2c/0x190 [ 1103.757461][T19080] ext4_append+0x26d/0x560 [ 1103.761879][T19080] ? ext4_match+0x650/0x650 [ 1103.766384][T19080] ? __dquot_initialize+0x299/0xc40 [ 1103.771610][T19080] ext4_init_new_dir+0x220/0x4c0 [ 1103.776561][T19080] ? ext4_init_dot_dotdot+0x560/0x560 [ 1103.781956][T19080] ext4_mkdir+0x316/0xb70 [ 1103.786293][T19080] ? generic_permission+0x230/0x6a0 [ 1103.791493][T19080] ? ext4_init_new_dir+0x4c0/0x4c0 [ 1103.796608][T19080] ? security_inode_permission+0xd8/0x100 [ 1103.802370][T19080] ? inode_permission+0xdd/0x5e0 [ 1103.807312][T19080] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 1103.812344][T19080] vfs_mkdir+0x532/0x7e0 [ 1103.816588][T19080] do_mkdirat+0x2a9/0x330 [ 1103.820920][T19080] ? __ia32_sys_mknod+0xb0/0xb0 [ 1103.825774][T19080] ? getname_flags.part.0+0x1d5/0x4d0 [ 1103.831187][T19080] __x64_sys_mkdirat+0x115/0x170 [ 1103.836141][T19080] do_syscall_64+0x38/0xb0 [ 1103.840570][T19080] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1103.846464][T19080] RIP: 0033:0x7ffba087b5e7 [ 1103.850876][T19080] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1103.870490][T19080] RSP: 002b:00007ffba159aee8 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1103.878906][T19080] RAX: ffffffffffffffda RBX: 0000000020004400 RCX: 00007ffba087b5e7 [ 1103.886879][T19080] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 1103.894854][T19080] RBP: 0000000020000140 R08: 0000000000000000 R09: 000000000000015a [ 1103.902838][T19080] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1103.912806][T19080] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1103.920785][T19080] 20:10:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1103.936486][T19064] team385: Port device gre316 added [ 1104.017617][ T5045] usb 5-1: new high-speed USB device number 48 using dummy_hcd [ 1104.106999][T19073] gre323: entered promiscuous mode [ 1104.115347][T19073] team396: Port device gre323 added [ 1104.256791][T19086] __nla_validate_parse: 3 callbacks suppressed [ 1104.256809][T19086] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1104.283301][T19086] team392: entered promiscuous mode [ 1104.289402][T19086] 8021q: adding VLAN 0 to HW filter on device team392 [ 1104.370971][T19087] gre321: entered promiscuous mode [ 1104.386787][T19087] team392: Port device gre321 added [ 1104.397474][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1104.419974][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1104.433919][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1104.457534][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1104.467195][ T5045] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1104.480941][ T5045] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1104.493317][ T5045] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1104.503030][ T5045] usb 5-1: config 0 descriptor?? 20:10:35 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_connect$uac1(0x4, 0x8d, &(0x7f00000000c0)={{0x12, 0x1, 0x100, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7b, 0x3, 0x1, 0x9, 0x0, 0x2, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x1, 0x91}, [@selector_unit={0x8, 0x24, 0x5, 0x3, 0x5, "d1e96d"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x6, 0x4, 0x4, 0x1}, @format_type_ii_discrete={0xc, 0x24, 0x2, 0x2, 0x3f, 0x8, 0x80, "4e801c"}]}, {{0x9, 0x5, 0x1, 0x9, 0x10, 0x81, 0x3, 0x3, {0x7, 0x25, 0x1, 0x2, 0x40, 0x5}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0x2, 0x7, 0x7, {0x7, 0x25, 0x1, 0x2a51b94ac50aa8c3, 0x7, 0x5}}}}}}}]}}, &(0x7f0000000500)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x1, 0x9, 0x1, 0x8}, 0x38, &(0x7f0000000180)={0x5, 0xf, 0x38, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0xc, 0x1, 0x1f, 0x6}, @wireless={0xb, 0x10, 0x1, 0xc, 0x18, 0x0, 0x6, 0xe000, 0xde}, @ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x1a, 0x3, 0x7, 0x8}, @ssp_cap={0x14, 0x10, 0xa, 0x6, 0x2, 0x4, 0xf, 0x3, [0x0, 0x0]}]}, 0x6, [{0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x1c01}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x421}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x407}}, {0xd0, &(0x7f00000002c0)=@string={0xd0, 0x3, "06fe3b9cb77803899d137ddd1a4ea05c9afb8e5a3642139e2dacbfb8a8e36243bab34c4a57c77de4c73144af76a7772fd8f35b44e7b5e5e82028084f9d75369ac7ceb6e18ed2a206f2fed93daa83af3df4a981c970c247c94183d90f4f5b6ac756439097c0385933978f92cbad837c54fac96f99d7beb3bbea12de1548c490b4bb4b72e37261187671e8ff92c61c0d6f649f91462491f2084f168f457208e8d708fd489b64e44f9bdf351373a0fbe1f41e7fb14ccba8e557c6119d4ae44b271b1d1786d71b0dc534343eb42f4257"}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x2c67}}, {0xcd, &(0x7f0000000400)=@string={0xcd, 0x3, "28c02e836b113eae179ffd74486c7dfc8e788fa076a723a01928adbabd13b3fca7f33883deb0c06716d2d025093768d1602c5c570510976bfda5b5f24a10c161a283e3cd27d90baab0927777b3b605e38c0a1080770bb6435b8e98a748dba7a70b332cce34ebf652da9d3cbfab69a3bced04f3499bbebfd724f9a0ec7424fd445ab612468ad04a1ab4c7ff44f4ba0011d3847d5d1c4dfdf52f2e4553c7710e6657cf5ddf63e27046966c475bd34e00c32f0509694da816d918fdd847820aa1d411d77038e79444b5469266"}}]}) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:35 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xff040000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x5, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:35 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 62) 20:10:35 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe2720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:35 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xcc620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1104.751973][T19089] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1104.760631][T19089] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1104.801683][T19096] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1104.805616][T19094] FAULT_INJECTION: forcing a failure. [ 1104.805616][T19094] name failslab, interval 1, probability 0, space 0, times 0 [ 1104.832610][T19094] CPU: 0 PID: 19094 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1104.843089][T19094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1104.844574][T19096] team397: entered promiscuous mode [ 1104.853147][T19094] Call Trace: [ 1104.853158][T19094] [ 1104.853165][T19094] dump_stack_lvl+0x125/0x1b0 [ 1104.853195][T19094] should_fail_ex+0x496/0x5b0 [ 1104.853223][T19094] should_failslab+0x9/0x20 [ 1104.853250][T19094] kmem_cache_alloc+0x33a/0x3b0 [ 1104.853280][T19094] __kernfs_new_node+0xd3/0x8a0 [ 1104.853308][T19094] ? kernfs_add_one+0x3ca/0x510 [ 1104.853333][T19094] ? kernfs_path_from_node+0x60/0x60 [ 1104.860947][T19096] 8021q: adding VLAN 0 to HW filter on device team397 [ 1104.861825][T19094] ? find_held_lock+0x2d/0x110 [ 1104.910013][T19094] ? up_write+0x1b3/0x510 [ 1104.914374][T19094] kernfs_new_node+0x94/0x110 [ 1104.919092][T19094] __kernfs_create_file+0x53/0x340 [ 1104.924245][T19094] sysfs_add_file_mode_ns+0x1ff/0x3b0 [ 1104.929657][T19094] internal_create_group+0x31c/0xb40 [ 1104.934973][T19094] ? sysfs_remove_group+0x170/0x170 [ 1104.940232][T19094] loop_configure+0xc5e/0x18c0 [ 1104.945057][T19094] lo_ioctl+0x745/0x1a50 [ 1104.949338][T19094] ? mark_held_locks+0x9f/0xe0 [ 1104.954142][T19094] ? kasan_quarantine_put+0x102/0x230 [ 1104.959556][T19094] ? loop_configure+0x18c0/0x18c0 [ 1104.964617][T19094] ? tomoyo_path_number_perm+0x273/0x590 [ 1104.970290][T19094] ? reacquire_held_locks+0x4b0/0x4b0 [ 1104.975698][T19094] ? tomoyo_path_number_perm+0x46e/0x590 [ 1104.981365][T19094] ? __kmem_cache_free+0xb8/0x2f0 [ 1104.986428][T19094] ? tomoyo_path_number_perm+0x190/0x590 [ 1104.992106][T19094] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1104.997979][T19094] ? reacquire_held_locks+0x4b0/0x4b0 [ 1105.003387][T19094] ? build_open_flags+0x690/0x690 [ 1105.008445][T19094] ? __vm_munmap+0x180/0x390 [ 1105.013150][T19094] ? loop_configure+0x18c0/0x18c0 [ 1105.018206][T19094] blkdev_ioctl+0x2f9/0x770 [ 1105.022769][T19094] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1105.028264][T19094] ? bpf_lsm_file_ioctl+0x9/0x10 [ 1105.033238][T19094] ? blkdev_common_ioctl+0x1c40/0x1c40 [ 1105.038741][T19094] __x64_sys_ioctl+0x18f/0x210 [ 1105.043539][T19094] do_syscall_64+0x38/0xb0 20:10:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x7, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1105.047990][T19094] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1105.053941][T19094] RIP: 0033:0x7ffba087c84b [ 1105.058379][T19094] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 [ 1105.078014][T19094] RSP: 002b:00007ffba159ae40 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1105.084429][T19102] gre324: entered promiscuous mode [ 1105.086423][T19094] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007ffba087c84b [ 1105.086442][T19094] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1105.086455][T19094] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000015a [ 1105.086467][T19094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1105.086480][T19094] R13: 00007ffba159af3c R14: 00007ffba159af40 R15: 00007ffb96fff000 [ 1105.086505][T19094] [ 1105.117441][ T5045] usbhid 5-1:0.0: can't add hid device: -71 20:10:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x8, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1105.153732][ T5045] usbhid: probe of 5-1:0.0 failed with error -71 [ 1105.162978][T19102] team397: Port device gre324 added [ 1105.173073][T19103] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1105.191628][ T5045] usb 5-1: USB disconnect, device number 48 20:10:35 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe3720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1105.211123][T19094] loop0: detected capacity change from 0 to 24 [ 1105.222946][T19103] team386: entered promiscuous mode [ 1105.228740][T19094] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1105.234435][T19103] 8021q: adding VLAN 0 to HW filter on device team386 [ 1105.243634][T19094] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:10:35 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 63) 20:10:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x21, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1105.364814][T19117] loop0: detected capacity change from 0 to 24 [ 1105.376198][T19119] dccp_invalid_packet: P.Data Offset(68) too large [ 1105.385962][T19117] FAULT_INJECTION: forcing a failure. [ 1105.385962][T19117] name failslab, interval 1, probability 0, space 0, times 0 [ 1105.406546][T19117] CPU: 0 PID: 19117 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1105.416999][T19117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1105.427053][T19117] Call Trace: [ 1105.430332][T19117] [ 1105.433260][T19117] dump_stack_lvl+0x125/0x1b0 [ 1105.434234][T19098] gre317: entered promiscuous mode [ 1105.437933][T19117] should_fail_ex+0x496/0x5b0 [ 1105.437971][T19117] should_failslab+0x9/0x20 [ 1105.437999][T19117] kmem_cache_alloc+0x33a/0x3b0 [ 1105.438032][T19117] jbd2_journal_add_journal_head+0x1e0/0x670 [ 1105.438070][T19117] jbd2_journal_get_create_access+0x44/0x550 [ 1105.438100][T19117] __ext4_journal_get_create_access+0x54/0x1f0 [ 1105.438128][T19117] ext4_getblk+0x388/0x810 [ 1105.438151][T19117] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1105.438172][T19117] ? ext4_issue_zeroout+0x1f0/0x1f0 [ 1105.438200][T19117] ext4_bread+0x2c/0x190 [ 1105.445345][T19098] team386: Port device gre317 added [ 1105.448627][T19117] ext4_append+0x26d/0x560 [ 1105.448658][T19117] ? ext4_match+0x650/0x650 [ 1105.448680][T19117] ? __dquot_initialize+0x299/0xc40 [ 1105.455464][T19100] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1105.458004][T19117] ext4_init_new_dir+0x220/0x4c0 [ 1105.458037][T19117] ? ext4_init_dot_dotdot+0x560/0x560 [ 1105.458067][T19117] ext4_mkdir+0x316/0xb70 [ 1105.458094][T19117] ? generic_permission+0x230/0x6a0 [ 1105.458114][T19117] ? ext4_init_new_dir+0x4c0/0x4c0 [ 1105.458135][T19117] ? security_inode_permission+0xd8/0x100 [ 1105.458166][T19117] ? inode_permission+0xdd/0x5e0 [ 1105.458183][T19117] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 1105.458205][T19117] vfs_mkdir+0x532/0x7e0 [ 1105.458227][T19117] do_mkdirat+0x2a9/0x330 [ 1105.458249][T19117] ? __ia32_sys_mknod+0xb0/0xb0 [ 1105.458272][T19117] ? getname_flags.part.0+0x1d5/0x4d0 [ 1105.458293][T19117] __x64_sys_mkdirat+0x115/0x170 [ 1105.458315][T19117] do_syscall_64+0x38/0xb0 [ 1105.458335][T19117] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1105.458356][T19117] RIP: 0033:0x7ffba087b5e7 [ 1105.458372][T19117] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1105.458391][T19117] RSP: 002b:00007ffba159aee8 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1105.458410][T19117] RAX: ffffffffffffffda RBX: 0000000020004400 RCX: 00007ffba087b5e7 [ 1105.458423][T19117] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 1105.458434][T19117] RBP: 0000000020000140 R08: 0000000000000000 R09: 000000000000015a [ 1105.458447][T19117] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1105.458459][T19117] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1105.458482][T19117] [ 1105.467954][T19117] ENOMEM in journal_alloc_journal_head, retrying. [ 1105.510779][T19100] team393: entered promiscuous mode [ 1105.524241][T19117] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1105.535091][T19100] 8021q: adding VLAN 0 to HW filter on device team393 [ 1105.541151][T19117] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1105.712371][T19115] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1105.714539][ T5045] usb 5-1: new high-speed USB device number 49 using dummy_hcd [ 1105.756514][T19115] team398: entered promiscuous mode [ 1105.776693][T19115] 8021q: adding VLAN 0 to HW filter on device team398 [ 1105.875485][T19120] gre325: entered promiscuous mode [ 1105.891740][T19120] team398: Port device gre325 added [ 1106.087657][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1106.098935][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1106.108857][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1106.119774][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1106.129996][ T5045] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1106.143333][ T5045] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1106.154334][ T5045] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1106.163888][ T5045] usb 5-1: config 0 descriptor?? [ 1106.648350][ T5045] keytouch 0003:0926:3333.006D: fixing up Keytouch IEC report descriptor [ 1106.660493][ T5045] keytouch 0003:0926:3333.006D: usb_submit_urb(out) failed: -90 [ 1106.668996][ T5045] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.006D/input/input120 [ 1106.753505][ T5045] keytouch 0003:0926:3333.006D: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 1106.850094][T12659] usb 5-1: USB disconnect, device number 49 20:10:37 executing program 4: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) (async) r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_connect$uac1(0x4, 0x8d, &(0x7f00000000c0)={{0x12, 0x1, 0x100, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7b, 0x3, 0x1, 0x9, 0x0, 0x2, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x1, 0x91}, [@selector_unit={0x8, 0x24, 0x5, 0x3, 0x5, "d1e96d"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x6, 0x4, 0x4, 0x1}, @format_type_ii_discrete={0xc, 0x24, 0x2, 0x2, 0x3f, 0x8, 0x80, "4e801c"}]}, {{0x9, 0x5, 0x1, 0x9, 0x10, 0x81, 0x3, 0x3, {0x7, 0x25, 0x1, 0x2, 0x40, 0x5}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0x2, 0x7, 0x7, {0x7, 0x25, 0x1, 0x2a51b94ac50aa8c3, 0x7, 0x5}}}}}}}]}}, &(0x7f0000000500)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x1, 0x9, 0x1, 0x8}, 0x38, &(0x7f0000000180)={0x5, 0xf, 0x38, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0xc, 0x1, 0x1f, 0x6}, @wireless={0xb, 0x10, 0x1, 0xc, 0x18, 0x0, 0x6, 0xe000, 0xde}, @ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x1a, 0x3, 0x7, 0x8}, @ssp_cap={0x14, 0x10, 0xa, 0x6, 0x2, 0x4, 0xf, 0x3, [0x0, 0x0]}]}, 0x6, [{0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x1c01}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x421}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x407}}, {0xd0, &(0x7f00000002c0)=@string={0xd0, 0x3, "06fe3b9cb77803899d137ddd1a4ea05c9afb8e5a3642139e2dacbfb8a8e36243bab34c4a57c77de4c73144af76a7772fd8f35b44e7b5e5e82028084f9d75369ac7ceb6e18ed2a206f2fed93daa83af3df4a981c970c247c94183d90f4f5b6ac756439097c0385933978f92cbad837c54fac96f99d7beb3bbea12de1548c490b4bb4b72e37261187671e8ff92c61c0d6f649f91462491f2084f168f457208e8d708fd489b64e44f9bdf351373a0fbe1f41e7fb14ccba8e557c6119d4ae44b271b1d1786d71b0dc534343eb42f4257"}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x2c67}}, {0xcd, &(0x7f0000000400)=@string={0xcd, 0x3, "28c02e836b113eae179ffd74486c7dfc8e788fa076a723a01928adbabd13b3fca7f33883deb0c06716d2d025093768d1602c5c570510976bfda5b5f24a10c161a283e3cd27d90baab0927777b3b605e38c0a1080770bb6435b8e98a748dba7a70b332cce34ebf652da9d3cbfab69a3bced04f3499bbebfd724f9a0ec7424fd445ab612468ad04a1ab4c7ff44f4ba0011d3847d5d1c4dfdf52f2e4553c7710e6657cf5ddf63e27046966c475bd34e00c32f0509694da816d918fdd847820aa1d411d77038e79444b5469266"}}]}) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:37 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xcd620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:37 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xff7f0000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:37 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 64) 20:10:37 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe4010000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2b, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1107.389483][T19127] loop0: detected capacity change from 0 to 24 [ 1107.391980][T19125] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1107.396051][T19127] FAULT_INJECTION: forcing a failure. [ 1107.396051][T19127] name failslab, interval 1, probability 0, space 0, times 0 20:10:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2c, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1107.455838][T19136] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1107.462109][T19125] team387: entered promiscuous mode [ 1107.469733][T19136] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1107.482839][T19127] CPU: 1 PID: 19127 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1107.486254][T19125] 8021q: adding VLAN 0 to HW filter on device team387 20:10:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1107.493292][T19127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1107.493307][T19127] Call Trace: [ 1107.493313][T19127] [ 1107.493320][T19127] dump_stack_lvl+0x125/0x1b0 [ 1107.493349][T19127] should_fail_ex+0x496/0x5b0 [ 1107.493378][T19127] should_failslab+0x9/0x20 [ 1107.493404][T19127] kmem_cache_alloc+0x33a/0x3b0 [ 1107.493439][T19127] jbd2_journal_add_journal_head+0x1e0/0x670 [ 1107.493473][T19127] jbd2_journal_get_create_access+0x44/0x550 [ 1107.493507][T19127] __ext4_journal_get_create_access+0x54/0x1f0 [ 1107.493539][T19127] ext4_getblk+0x388/0x810 [ 1107.493565][T19127] ? ext4_iomap_overwrite_begin+0xb0/0xb0 [ 1107.540887][T19128] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1107.541229][T19127] ? ext4_issue_zeroout+0x1f0/0x1f0 [ 1107.577869][T19127] ext4_bread+0x2c/0x190 [ 1107.582476][T19127] ext4_append+0x26d/0x560 [ 1107.586891][T19127] ? ext4_match+0x650/0x650 [ 1107.591395][T19127] ? __dquot_initialize+0x299/0xc40 [ 1107.596606][T19127] ext4_init_new_dir+0x220/0x4c0 [ 1107.601907][T19127] ? ext4_init_dot_dotdot+0x560/0x560 [ 1107.607293][T19127] ext4_mkdir+0x316/0xb70 [ 1107.611720][T19127] ? generic_permission+0x230/0x6a0 [ 1107.616916][T19127] ? ext4_init_new_dir+0x4c0/0x4c0 [ 1107.622023][T19127] ? security_inode_permission+0xd8/0x100 [ 1107.627859][T19127] ? inode_permission+0xdd/0x5e0 [ 1107.632787][T19127] ? bpf_lsm_inode_mkdir+0x9/0x10 [ 1107.637807][T19127] vfs_mkdir+0x532/0x7e0 [ 1107.642052][T19127] do_mkdirat+0x2a9/0x330 [ 1107.646378][T19127] ? __ia32_sys_mknod+0xb0/0xb0 [ 1107.651228][T19127] ? getname_flags.part.0+0x1d5/0x4d0 [ 1107.656593][T19127] __x64_sys_mkdirat+0x115/0x170 [ 1107.661535][T19127] do_syscall_64+0x38/0xb0 [ 1107.665948][T19127] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1107.671835][T19127] RIP: 0033:0x7ffba087b5e7 [ 1107.676269][T19127] Code: 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1107.695901][T19127] RSP: 002b:00007ffba159aee8 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 1107.704326][T19127] RAX: ffffffffffffffda RBX: 0000000020004400 RCX: 00007ffba087b5e7 [ 1107.712567][T19127] RDX: 00000000000001ff RSI: 0000000020000000 RDI: 00000000ffffff9c [ 1107.720544][T19127] RBP: 0000000020000140 R08: 0000000000000000 R09: 000000000000015a [ 1107.728604][T19127] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1107.736569][T19127] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1107.744555][T19127] 20:10:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x3a, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:38 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 65) [ 1107.761210][T19127] ENOMEM in journal_alloc_journal_head, retrying. [ 1107.768848][T19127] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1107.780531][T19127] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1107.781787][T19128] team399: entered promiscuous mode [ 1107.793771][T19128] 8021q: adding VLAN 0 to HW filter on device team399 20:10:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x3c, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1107.897627][ T5045] usb 5-1: new high-speed USB device number 50 using dummy_hcd [ 1107.914213][T19147] loop0: detected capacity change from 0 to 24 [ 1107.929160][T19147] FAULT_INJECTION: forcing a failure. [ 1107.929160][T19147] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1107.951414][T19147] CPU: 1 PID: 19147 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1107.961915][T19147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1107.971997][T19147] Call Trace: [ 1107.975339][T19147] [ 1107.978450][T19147] dump_stack_lvl+0x125/0x1b0 [ 1107.983150][T19147] should_fail_ex+0x496/0x5b0 [ 1107.987845][T19147] _copy_from_user+0x30/0xf0 [ 1107.992451][T19147] memdup_user+0x71/0xd0 [ 1107.996706][T19147] strndup_user+0x74/0xe0 [ 1108.000701][T19135] gre318: entered promiscuous mode [ 1108.001045][T19147] __x64_sys_mount+0x138/0x310 [ 1108.001071][T19147] ? copy_mnt_ns+0xb60/0xb60 [ 1108.001092][T19147] ? syscall_enter_from_user_mode+0x26/0x80 [ 1108.001125][T19147] do_syscall_64+0x38/0xb0 [ 1108.001146][T19147] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1108.001168][T19147] RIP: 0033:0x7ffba087e1ea [ 1108.001184][T19147] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1108.001202][T19147] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1108.001220][T19147] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1108.001230][T19147] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1108.001240][T19147] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1108.001250][T19147] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1108.001260][T19147] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1108.001278][T19147] [ 1108.121518][T19135] team387: Port device gre318 added [ 1108.127231][T19137] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1108.158630][T19137] team394: entered promiscuous mode [ 1108.167619][T19137] 8021q: adding VLAN 0 to HW filter on device team394 [ 1108.314006][T19138] gre326: entered promiscuous mode [ 1108.322299][T19138] team399: Port device gre326 added [ 1108.350220][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1108.361457][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1108.374874][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1108.390572][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1108.401353][ T5045] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1108.418707][ T5045] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1108.431299][ T5045] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1108.443068][ T5045] usb 5-1: config 0 descriptor?? [ 1108.470107][T19141] gre322: entered promiscuous mode [ 1108.477116][T19141] team394: Port device gre322 added [ 1108.787484][ T5045] usbhid 5-1:0.0: can't add hid device: -71 [ 1108.793701][ T5045] usbhid: probe of 5-1:0.0 failed with error -71 [ 1108.802194][ T5045] usb 5-1: USB disconnect, device number 50 20:10:39 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_connect$uac1(0x4, 0x8d, &(0x7f00000000c0)={{0x12, 0x1, 0x100, 0x0, 0x0, 0x0, 0x40, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7b, 0x3, 0x1, 0x9, 0x0, 0x2, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x1, 0x91}, [@selector_unit={0x8, 0x24, 0x5, 0x3, 0x5, "d1e96d"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8, 0x24, 0x2, 0x1, 0x6, 0x4, 0x4, 0x1}, @format_type_ii_discrete={0xc, 0x24, 0x2, 0x2, 0x3f, 0x8, 0x80, "4e801c"}]}, {{0x9, 0x5, 0x1, 0x9, 0x10, 0x81, 0x3, 0x3, {0x7, 0x25, 0x1, 0x2, 0x40, 0x5}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0x2, 0x7, 0x7, {0x7, 0x25, 0x1, 0x2a51b94ac50aa8c3, 0x7, 0x5}}}}}}}]}}, &(0x7f0000000500)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x1, 0x9, 0x1, 0x8}, 0x38, &(0x7f0000000180)={0x5, 0xf, 0x38, 0x5, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0xc, 0x1, 0x1f, 0x6}, @wireless={0xb, 0x10, 0x1, 0xc, 0x18, 0x0, 0x6, 0xe000, 0xde}, @ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0x1a, 0x3, 0x7, 0x8}, @ssp_cap={0x14, 0x10, 0xa, 0x6, 0x2, 0x4, 0xf, 0x3, [0x0, 0x0]}]}, 0x6, [{0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x1c01}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x421}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x407}}, {0xd0, &(0x7f00000002c0)=@string={0xd0, 0x3, "06fe3b9cb77803899d137ddd1a4ea05c9afb8e5a3642139e2dacbfb8a8e36243bab34c4a57c77de4c73144af76a7772fd8f35b44e7b5e5e82028084f9d75369ac7ceb6e18ed2a206f2fed93daa83af3df4a981c970c247c94183d90f4f5b6ac756439097c0385933978f92cbad837c54fac96f99d7beb3bbea12de1548c490b4bb4b72e37261187671e8ff92c61c0d6f649f91462491f2084f168f457208e8d708fd489b64e44f9bdf351373a0fbe1f41e7fb14ccba8e557c6119d4ae44b271b1d1786d71b0dc534343eb42f4257"}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x2c67}}, {0xcd, &(0x7f0000000400)=@string={0xcd, 0x3, "28c02e836b113eae179ffd74486c7dfc8e788fa076a723a01928adbabd13b3fca7f33883deb0c06716d2d025093768d1602c5c570510976bfda5b5f24a10c161a283e3cd27d90baab0927777b3b605e38c0a1080770bb6435b8e98a748dba7a70b332cce34ebf652da9d3cbfab69a3bced04f3499bbebfd724f9a0ec7424fd445ab612468ad04a1ab4c7ff44f4ba0011d3847d5d1c4dfdf52f2e4553c7710e6657cf5ddf63e27046966c475bd34e00c32f0509694da816d918fdd847820aa1d411d77038e79444b5469266"}}]}) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x73, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:39 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xffff0300, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:39 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 66) 20:10:39 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe4720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:39 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xce620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1109.219435][T19158] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1109.238690][T19157] loop0: detected capacity change from 0 to 24 [ 1109.261247][T19158] team395: entered promiscuous mode 20:10:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x2, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:39 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 67) [ 1109.266833][T19158] 8021q: adding VLAN 0 to HW filter on device team395 20:10:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x3, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1109.333169][T19165] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1109.349168][T19170] loop0: detected capacity change from 0 to 24 [ 1109.355882][T19170] FAULT_INJECTION: forcing a failure. [ 1109.355882][T19170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1109.381663][T19170] CPU: 0 PID: 19170 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1109.392131][T19170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1109.402217][T19170] Call Trace: [ 1109.405512][T19170] [ 1109.406263][T19165] team388: entered promiscuous mode [ 1109.408435][T19170] dump_stack_lvl+0x125/0x1b0 [ 1109.408467][T19170] should_fail_ex+0x496/0x5b0 [ 1109.408497][T19170] _copy_from_user+0x30/0xf0 [ 1109.408521][T19170] memdup_user+0x71/0xd0 20:10:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x4, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x5, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1109.408544][T19170] strndup_user+0x74/0xe0 [ 1109.408566][T19170] __x64_sys_mount+0x138/0x310 [ 1109.408588][T19170] ? copy_mnt_ns+0xb60/0xb60 [ 1109.408609][T19170] ? syscall_enter_from_user_mode+0x26/0x80 [ 1109.408638][T19170] do_syscall_64+0x38/0xb0 [ 1109.408657][T19170] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1109.408678][T19170] RIP: 0033:0x7ffba087e1ea [ 1109.408694][T19170] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1109.408712][T19170] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1109.408732][T19170] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1109.408745][T19170] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1109.408757][T19170] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1109.408769][T19170] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1109.408781][T19170] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1109.408802][T19170] [ 1109.541556][T19165] 8021q: adding VLAN 0 to HW filter on device team388 [ 1109.564059][T19166] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1109.594095][T19166] team400: entered promiscuous mode [ 1109.610908][T12655] usb 5-1: new high-speed USB device number 51 using dummy_hcd [ 1109.621664][T19166] 8021q: adding VLAN 0 to HW filter on device team400 [ 1109.717222][T19160] gre327: entered promiscuous mode [ 1109.731846][T19160] team400: Port device gre327 added [ 1109.830992][T19167] gre323: entered promiscuous mode [ 1109.838601][T19167] team395: Port device gre323 added [ 1109.955263][T19159] gre319: entered promiscuous mode [ 1109.962959][T19159] team388: Port device gre319 added [ 1109.987556][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1110.007428][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1110.017196][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1110.057354][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1110.067014][T12655] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1110.097583][T12655] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1110.106659][T12655] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1110.148729][T12655] usb 5-1: config 0 descriptor?? [ 1110.438429][T12655] keytouch 0003:0926:3333.006E: fixing up Keytouch IEC report descriptor [ 1110.450452][T12655] keytouch 0003:0926:3333.006E: usb_submit_urb(out) failed: -90 [ 1110.459062][T12655] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.006E/input/input121 [ 1110.544704][T12655] keytouch 0003:0926:3333.006E: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 1110.642413][T12655] usb 5-1: USB disconnect, device number 51 20:10:41 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0xffffff0a, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x6, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:41 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 68) 20:10:41 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe4ffffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:41 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xcf620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:41 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xffffa888, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x7, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1111.165642][T19186] loop0: detected capacity change from 0 to 24 [ 1111.184023][T19189] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1111.198459][T19186] FAULT_INJECTION: forcing a failure. [ 1111.198459][T19186] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1111.213029][T19189] team401: entered promiscuous mode [ 1111.229556][T19189] 8021q: adding VLAN 0 to HW filter on device team401 [ 1111.236943][T19186] CPU: 0 PID: 19186 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1111.247396][T19186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1111.257471][T19186] Call Trace: [ 1111.260806][T19186] [ 1111.263747][T19186] dump_stack_lvl+0x125/0x1b0 [ 1111.268445][T19186] should_fail_ex+0x496/0x5b0 [ 1111.273233][T19186] _copy_from_user+0x30/0xf0 [ 1111.277878][T19186] memdup_user+0x71/0xd0 [ 1111.282151][T19186] strndup_user+0x74/0xe0 [ 1111.286593][T19186] __x64_sys_mount+0x138/0x310 [ 1111.291389][T19186] ? copy_mnt_ns+0xb60/0xb60 [ 1111.296004][T19186] ? syscall_enter_from_user_mode+0x26/0x80 [ 1111.301946][T19186] do_syscall_64+0x38/0xb0 [ 1111.306416][T19186] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1111.312332][T19186] RIP: 0033:0x7ffba087e1ea [ 1111.316763][T19186] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1111.336424][T19186] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1111.344858][T19186] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1111.352858][T19186] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 20:10:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x8, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xa, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1111.360855][T19186] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1111.368852][T19186] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1111.376849][T19186] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1111.384851][T19186] 20:10:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xe, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1111.433890][T19189] gre328: entered promiscuous mode 20:10:41 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 69) [ 1111.456967][T19189] team401: Port device gre328 added 20:10:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x11, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1111.487491][ T6580] usb 5-1: new high-speed USB device number 52 using dummy_hcd [ 1111.518327][T19196] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1111.553968][T19209] loop0: detected capacity change from 0 to 24 [ 1111.562492][T19196] team389: entered promiscuous mode [ 1111.572954][T19209] FAULT_INJECTION: forcing a failure. [ 1111.572954][T19209] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1111.594204][T19196] 8021q: adding VLAN 0 to HW filter on device team389 [ 1111.612817][T19209] CPU: 1 PID: 19209 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1111.623266][T19209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1111.633317][T19209] Call Trace: [ 1111.636589][T19209] [ 1111.639514][T19209] dump_stack_lvl+0x125/0x1b0 [ 1111.644196][T19209] should_fail_ex+0x496/0x5b0 [ 1111.648882][T19209] _copy_from_user+0x30/0xf0 [ 1111.653476][T19209] copy_mount_options+0x76/0x190 [ 1111.658437][T19209] __x64_sys_mount+0x1ad/0x310 [ 1111.663217][T19209] ? copy_mnt_ns+0xb60/0xb60 [ 1111.667819][T19209] ? syscall_enter_from_user_mode+0x26/0x80 [ 1111.673724][T19209] do_syscall_64+0x38/0xb0 [ 1111.678147][T19209] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1111.684045][T19209] RIP: 0033:0x7ffba087e1ea [ 1111.688464][T19209] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1111.708081][T19209] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1111.716498][T19209] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1111.724468][T19209] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1111.732442][T19209] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1111.740409][T19209] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1111.748371][T19209] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1111.756349][T19209] [ 1111.767170][T19197] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1111.785859][T19197] team396: entered promiscuous mode [ 1111.786543][T19209] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1111.791447][T19197] 8021q: adding VLAN 0 to HW filter on device team396 [ 1111.803163][T19209] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1111.927791][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1111.947367][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1111.957177][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1111.979872][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1111.989372][T19199] gre324: entered promiscuous mode [ 1111.991453][T19199] team396: Port device gre324 added [ 1111.995635][ T6580] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1112.017765][ T6580] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1112.066918][ T6580] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1112.077887][ T6580] usb 5-1: config 0 descriptor?? [ 1112.158598][T19201] gre320: entered promiscuous mode [ 1112.166784][T19201] team389: Port device gre320 added [ 1112.657445][ T6580] usbhid 5-1:0.0: can't add hid device: -71 [ 1112.663517][ T6580] usbhid: probe of 5-1:0.0 failed with error -71 [ 1112.672029][ T6580] usb 5-1: USB disconnect, device number 52 20:10:43 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0xffffff0a, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:43 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe5720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x14, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:43 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 70) 20:10:43 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd0620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:43 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xfffff000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x28, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1113.134273][T19219] loop0: detected capacity change from 0 to 24 [ 1113.146064][T19222] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1113.158466][T19219] FAULT_INJECTION: forcing a failure. [ 1113.158466][T19219] name fail_usercopy, interval 1, probability 0, space 0, times 0 20:10:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x36, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1113.174606][T19219] CPU: 0 PID: 19219 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1113.185057][T19219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1113.195136][T19219] Call Trace: [ 1113.198547][T19219] [ 1113.201490][T19219] dump_stack_lvl+0x125/0x1b0 [ 1113.206202][T19219] should_fail_ex+0x496/0x5b0 [ 1113.210925][T19219] _copy_from_user+0x30/0xf0 [ 1113.215537][T19219] copy_mount_options+0x76/0x190 [ 1113.220512][T19219] __x64_sys_mount+0x1ad/0x310 [ 1113.225310][T19219] ? copy_mnt_ns+0xb60/0xb60 [ 1113.229926][T19219] ? syscall_enter_from_user_mode+0x26/0x80 [ 1113.235854][T19219] do_syscall_64+0x38/0xb0 [ 1113.240274][T19219] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1113.246168][T19219] RIP: 0033:0x7ffba087e1ea [ 1113.250582][T19219] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1113.270199][T19219] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1113.278614][T19219] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1113.286613][T19219] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1113.294682][T19219] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1113.302751][T19219] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1113.310727][T19219] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1113.318714][T19219] 20:10:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x60, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xe0, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1113.342482][T19222] team397: entered promiscuous mode [ 1113.356289][T19222] 8021q: adding VLAN 0 to HW filter on device team397 20:10:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x1f4, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1113.425184][T19219] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1113.436257][T19219] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:10:43 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 71) [ 1113.473500][ T6580] usb 5-1: new high-speed USB device number 53 using dummy_hcd [ 1113.534561][T19242] loop0: detected capacity change from 0 to 24 [ 1113.542496][T19242] FAULT_INJECTION: forcing a failure. [ 1113.542496][T19242] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.566271][T19242] CPU: 1 PID: 19242 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1113.576805][T19242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1113.586944][T19242] Call Trace: [ 1113.590240][T19242] [ 1113.593166][T19242] dump_stack_lvl+0x125/0x1b0 [ 1113.597848][T19242] should_fail_ex+0x496/0x5b0 [ 1113.602528][T19242] should_failslab+0x9/0x20 [ 1113.607032][T19242] kmem_cache_alloc+0x33a/0x3b0 [ 1113.611889][T19242] getname_flags.part.0+0x50/0x4d0 [ 1113.617028][T19242] getname_flags+0x9c/0xf0 [ 1113.621461][T19242] user_path_at_empty+0x2c/0x60 [ 1113.626318][T19242] __x64_sys_mount+0x1ff/0x310 [ 1113.631086][T19242] ? copy_mnt_ns+0xb60/0xb60 [ 1113.635677][T19242] ? syscall_enter_from_user_mode+0x26/0x80 [ 1113.641583][T19242] do_syscall_64+0x38/0xb0 [ 1113.645997][T19242] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1113.651886][T19242] RIP: 0033:0x7ffba087e1ea [ 1113.656300][T19242] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1113.676175][T19242] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1113.684602][T19242] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1113.692668][T19242] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1113.700725][T19242] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1113.708701][T19242] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1113.716671][T19242] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1113.724661][T19242] [ 1113.786873][T19229] gre325: entered promiscuous mode [ 1113.803777][T19229] team397: Port device gre325 added [ 1113.811603][T19230] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1113.869733][T19230] team390: entered promiscuous mode [ 1113.875284][T19230] 8021q: adding VLAN 0 to HW filter on device team390 [ 1113.897187][T19231] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1113.917595][T19231] team402: entered promiscuous mode [ 1113.923041][T19231] 8021q: adding VLAN 0 to HW filter on device team402 [ 1113.970131][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1113.993259][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1114.004618][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1114.021978][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1114.031971][ T6580] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1114.045952][ T6580] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1114.073413][ T6580] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1114.087925][ T6580] usb 5-1: config 0 descriptor?? [ 1114.106906][T19236] gre329: entered promiscuous mode [ 1114.115470][T19236] team402: Port device gre329 added [ 1114.227035][T19224] gre321: entered promiscuous mode [ 1114.236265][T19224] team390: Port device gre321 added [ 1114.617433][ T6580] usbhid 5-1:0.0: can't add hid device: -71 [ 1114.623423][ T6580] usbhid: probe of 5-1:0.0 failed with error -71 [ 1114.635976][ T6580] usb 5-1: USB disconnect, device number 53 20:10:45 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0xffffff0a, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x300, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:45 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd1620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:45 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 72) 20:10:45 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe60daa46, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:45 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xffffff7f, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x3e8, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1115.081612][T19252] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1115.093552][T19251] loop0: detected capacity change from 0 to 24 [ 1115.100767][T19251] FAULT_INJECTION: forcing a failure. [ 1115.100767][T19251] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1115.119667][T19251] CPU: 1 PID: 19251 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 20:10:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x500, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1115.130131][T19251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1115.140241][T19251] Call Trace: [ 1115.143536][T19251] [ 1115.146490][T19251] dump_stack_lvl+0x125/0x1b0 [ 1115.151197][T19251] should_fail_ex+0x496/0x5b0 [ 1115.155925][T19251] strncpy_from_user+0x38/0x300 [ 1115.160815][T19251] getname_flags.part.0+0x93/0x4d0 [ 1115.165964][T19251] getname_flags+0x9c/0xf0 [ 1115.170420][T19251] user_path_at_empty+0x2c/0x60 [ 1115.175312][T19251] __x64_sys_mount+0x1ff/0x310 20:10:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x600, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x700, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1115.180110][T19251] ? copy_mnt_ns+0xb60/0xb60 [ 1115.184718][T19251] ? syscall_enter_from_user_mode+0x26/0x80 [ 1115.190661][T19251] do_syscall_64+0x38/0xb0 [ 1115.195107][T19251] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1115.201028][T19251] RIP: 0033:0x7ffba087e1ea [ 1115.205473][T19251] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1115.225107][T19251] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1115.233543][T19251] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1115.241516][T19251] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1115.249491][T19251] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1115.257460][T19251] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1115.265698][T19251] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1115.273678][T19251] 20:10:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xa00, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1115.289460][T19252] team398: entered promiscuous mode [ 1115.295211][T19252] 8021q: adding VLAN 0 to HW filter on device team398 [ 1115.315089][T19258] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:10:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xe00, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1115.337893][T19258] team391: entered promiscuous mode [ 1115.344521][T19258] 8021q: adding VLAN 0 to HW filter on device team391 [ 1115.405837][T19260] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1115.427652][T15110] usb 5-1: new high-speed USB device number 54 using dummy_hcd [ 1115.435647][T19260] team403: entered promiscuous mode [ 1115.441481][T19260] 8021q: adding VLAN 0 to HW filter on device team403 [ 1115.547609][T19266] gre330: entered promiscuous mode [ 1115.567852][T19266] team403: Port device gre330 added [ 1115.672300][T19268] gre326: entered promiscuous mode [ 1115.679948][T19268] team398: Port device gre326 added [ 1115.806170][T19263] gre322: entered promiscuous mode [ 1115.813737][T19263] team391: Port device gre322 added [ 1115.827613][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1115.859861][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1115.878327][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1115.900149][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1115.919126][T15110] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1115.947350][T15110] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1115.956453][T15110] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1115.999427][T15110] usb 5-1: config 0 descriptor?? [ 1116.128831][ T1228] ieee802154 phy0 wpan0: encryption failed: -22 [ 1116.135210][ T1228] ieee802154 phy1 wpan1: encryption failed: -22 [ 1116.557453][T15110] usbhid 5-1:0.0: can't add hid device: -71 [ 1116.563472][T15110] usbhid: probe of 5-1:0.0 failed with error -71 [ 1116.571897][T15110] usb 5-1: USB disconnect, device number 54 20:10:47 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000000)={0x2c, &(0x7f00000000c0)=ANY=[@ANYBLOB="fcff012f32fe4708245a5fa5e23a11744f28907fa3d4b379da3d98fe411dcf65021a95139699de00bcf8d85f94130a4c22adcad5a9488c61ff4c93af23114652de098579f38c739f713ff84b7d79af94491771967f8745c6ff81651654d8797696eb386eab818136549d0e4167eb"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:47 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 73) 20:10:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x1100, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:47 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe6720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:47 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd2620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:47 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xffffff9e, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x1400, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1117.006643][T19283] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1117.018335][T19285] loop0: detected capacity change from 0 to 24 20:10:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x1f00, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1117.048717][T19285] FAULT_INJECTION: forcing a failure. [ 1117.048717][T19285] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.073839][T19283] team392: entered promiscuous mode [ 1117.079882][T19283] 8021q: adding VLAN 0 to HW filter on device team392 [ 1117.103295][T19290] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1117.103511][T19285] CPU: 1 PID: 19285 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1117.122981][T19285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1117.129008][T19290] team404: entered promiscuous mode [ 1117.133044][T19285] Call Trace: [ 1117.133053][T19285] [ 1117.133061][T19285] dump_stack_lvl+0x125/0x1b0 [ 1117.133090][T19285] should_fail_ex+0x496/0x5b0 [ 1117.133120][T19285] should_failslab+0x9/0x20 [ 1117.140529][T19290] 8021q: adding VLAN 0 to HW filter on device team404 [ 1117.141592][T19285] __kmem_cache_alloc_node+0x2fd/0x350 [ 1117.141626][T19285] ? tomoyo_encode2+0x100/0x3d0 [ 1117.141659][T19285] ? tomoyo_encode2+0x100/0x3d0 [ 1117.180304][T19285] __kmalloc+0x4c/0x100 [ 1117.184500][T19285] tomoyo_encode2+0x100/0x3d0 [ 1117.189214][T19285] ? __kernel_text_address+0xd/0x30 [ 1117.194445][T19285] tomoyo_encode+0x29/0x50 [ 1117.198922][T19285] tomoyo_mount_acl+0x145/0x880 [ 1117.203802][T19285] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 1117.209479][T19285] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1117.215486][T19285] ? tomoyo_domain+0xbd/0x150 [ 1117.220158][T19285] ? tomoyo_profile+0x47/0x60 [ 1117.224856][T19285] tomoyo_mount_permission+0x16d/0x410 [ 1117.230318][T19285] ? tomoyo_mount_permission+0x10b/0x410 [ 1117.235955][T19285] ? tomoyo_mount_acl+0x880/0x880 [ 1117.240993][T19285] security_sb_mount+0x86/0xd0 [ 1117.245758][T19285] path_mount+0x129/0x1ed0 [ 1117.250175][T19285] ? kmem_cache_free+0xf0/0x490 [ 1117.255048][T19285] ? finish_automount+0xa50/0xa50 [ 1117.260066][T19285] ? putname+0x101/0x140 [ 1117.264302][T19285] __x64_sys_mount+0x293/0x310 [ 1117.269067][T19285] ? copy_mnt_ns+0xb60/0xb60 [ 1117.273752][T19285] ? syscall_enter_from_user_mode+0x26/0x80 [ 1117.279747][T19285] do_syscall_64+0x38/0xb0 [ 1117.284167][T19285] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1117.290063][T19285] RIP: 0033:0x7ffba087e1ea [ 1117.294479][T19285] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1117.314110][T19285] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1117.322538][T19285] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1117.330516][T19285] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1117.338491][T19285] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1117.346462][T19285] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 20:10:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x24ab, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1117.354445][T19285] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1117.362442][T19285] 20:10:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x2800, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x3600, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1117.441343][T15110] usb 5-1: new high-speed USB device number 55 using dummy_hcd 20:10:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x4000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1117.606762][T19291] gre323: entered promiscuous mode [ 1117.630194][T19291] team392: Port device gre323 added [ 1117.636027][T19292] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1117.665479][T19292] team399: entered promiscuous mode [ 1117.671023][T19292] 8021q: adding VLAN 0 to HW filter on device team399 [ 1117.789403][T19280] gre331: entered promiscuous mode [ 1117.797720][T19280] team404: Port device gre331 added [ 1117.816887][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1117.847373][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1117.857161][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1117.873207][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1117.884052][T15110] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1117.897555][T15110] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1117.906925][T15110] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1117.922046][T15110] usb 5-1: config 0 descriptor?? [ 1117.955202][T19284] gre327: entered promiscuous mode [ 1117.966379][T19284] team399: Port device gre327 added [ 1118.657484][T15110] usbhid 5-1:0.0: can't add hid device: -71 [ 1118.663541][T15110] usbhid: probe of 5-1:0.0 failed with error -71 [ 1118.671957][T15110] usb 5-1: USB disconnect, device number 55 20:10:49 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f0000000000)={0x2c, &(0x7f00000000c0)=ANY=[@ANYBLOB="fcff012f32fe4708245a5fa5e23a11744f28907fa3d4b379da3d98fe411dcf65021a95139699de00bcf8d85f94130a4c22adcad5a9488c61ff4c93af23114652de098579f38c739f713ff84b7d79af94491771967f8745c6ff81651654d8797696eb386eab818136549d0e4167eb"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:49 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 74) 20:10:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x6000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:49 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe7720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:49 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xffffffc3, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:49 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd3620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xab24, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1119.168952][T19309] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1119.186905][T19314] loop0: detected capacity change from 0 to 24 [ 1119.198354][T19309] team405: entered promiscuous mode [ 1119.204138][T19309] 8021q: adding VLAN 0 to HW filter on device team405 [ 1119.206858][T19314] FAULT_INJECTION: forcing a failure. [ 1119.206858][T19314] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.234370][T19311] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1119.244677][T19314] CPU: 0 PID: 19314 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1119.255122][T19314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1119.257986][T19311] team393: entered promiscuous mode [ 1119.265175][T19314] Call Trace: [ 1119.265186][T19314] [ 1119.265193][T19314] dump_stack_lvl+0x125/0x1b0 [ 1119.265222][T19314] should_fail_ex+0x496/0x5b0 [ 1119.270930][T19311] 8021q: adding VLAN 0 to HW filter on device team393 [ 1119.273771][T19314] should_failslab+0x9/0x20 [ 1119.273807][T19314] __kmem_cache_alloc_node+0x2fd/0x350 [ 1119.302762][T19314] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1119.308502][T19314] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1119.314236][T19314] __kmalloc+0x4c/0x100 [ 1119.318501][T19314] tomoyo_realpath_from_path+0xb9/0x710 [ 1119.324057][T19314] ? tomoyo_fill_path_info+0x233/0x420 [ 1119.329541][T19314] tomoyo_mount_acl+0x1af/0x880 [ 1119.334409][T19314] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 1119.339967][T19314] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1119.346340][T19314] ? tomoyo_domain+0xbd/0x150 [ 1119.351022][T19314] ? tomoyo_profile+0x47/0x60 [ 1119.355705][T19314] tomoyo_mount_permission+0x16d/0x410 [ 1119.361168][T19314] ? tomoyo_mount_permission+0x10b/0x410 [ 1119.366807][T19314] ? tomoyo_mount_acl+0x880/0x880 [ 1119.371870][T19314] security_sb_mount+0x86/0xd0 [ 1119.376661][T19314] path_mount+0x129/0x1ed0 [ 1119.381076][T19314] ? kmem_cache_free+0xf0/0x490 [ 1119.385919][T19314] ? finish_automount+0xa50/0xa50 [ 1119.390951][T19314] ? putname+0x101/0x140 [ 1119.395189][T19314] __x64_sys_mount+0x293/0x310 [ 1119.399951][T19314] ? copy_mnt_ns+0xb60/0xb60 [ 1119.404532][T19314] ? syscall_enter_from_user_mode+0x26/0x80 [ 1119.410438][T19314] do_syscall_64+0x38/0xb0 [ 1119.414856][T19314] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1119.420751][T19314] RIP: 0033:0x7ffba087e1ea [ 1119.425159][T19314] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1119.444766][T19314] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1119.453187][T19314] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1119.461158][T19314] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1119.469124][T19314] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1119.477094][T19314] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1119.485062][T19314] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1119.493138][T19314] 20:10:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xe000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1119.515666][T19314] ERROR: Out of memory at tomoyo_realpath_from_path. 20:10:49 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 75) 20:10:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xe5ff, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1119.630365][T19325] loop0: detected capacity change from 0 to 24 [ 1119.646311][T19325] FAULT_INJECTION: forcing a failure. [ 1119.646311][T19325] name failslab, interval 1, probability 0, space 0, times 0 [ 1119.647715][T15110] usb 5-1: new high-speed USB device number 56 using dummy_hcd [ 1119.660912][T19325] CPU: 1 PID: 19325 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1119.677087][T19325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1119.687178][T19325] Call Trace: [ 1119.690458][T19325] [ 1119.693387][T19325] dump_stack_lvl+0x125/0x1b0 [ 1119.698079][T19325] should_fail_ex+0x496/0x5b0 [ 1119.702781][T19325] should_failslab+0x9/0x20 [ 1119.707293][T19325] __kmem_cache_alloc_node+0x2fd/0x350 [ 1119.712768][T19325] ? tomoyo_encode2+0x100/0x3d0 [ 1119.717635][T19325] ? tomoyo_encode2+0x100/0x3d0 [ 1119.722520][T19325] __kmalloc+0x4c/0x100 [ 1119.726712][T19325] tomoyo_encode2+0x100/0x3d0 [ 1119.731413][T19325] ? rcu_is_watching+0x12/0xb0 [ 1119.736211][T19325] tomoyo_encode+0x29/0x50 [ 1119.740661][T19325] tomoyo_realpath_from_path+0x196/0x710 [ 1119.746321][T19325] tomoyo_mount_acl+0x1af/0x880 [ 1119.751199][T19325] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 1119.756774][T19325] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1119.762790][T19325] ? tomoyo_domain+0xbd/0x150 [ 1119.767474][T19325] ? tomoyo_profile+0x47/0x60 [ 1119.772171][T19325] tomoyo_mount_permission+0x16d/0x410 [ 1119.777499][T19315] gre324: entered promiscuous mode [ 1119.782823][T19325] ? tomoyo_mount_permission+0x10b/0x410 [ 1119.782863][T19325] ? tomoyo_mount_acl+0x880/0x880 [ 1119.782898][T19325] security_sb_mount+0x86/0xd0 [ 1119.782923][T19325] path_mount+0x129/0x1ed0 [ 1119.782943][T19325] ? kmem_cache_free+0xf0/0x490 [ 1119.782963][T19325] ? finish_automount+0xa50/0xa50 [ 1119.782982][T19325] ? putname+0x101/0x140 [ 1119.783000][T19325] __x64_sys_mount+0x293/0x310 [ 1119.783017][T19325] ? copy_mnt_ns+0xb60/0xb60 20:10:50 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xffffffe4, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1119.783035][T19325] ? syscall_enter_from_user_mode+0x26/0x80 [ 1119.783061][T19325] do_syscall_64+0x38/0xb0 [ 1119.799800][T19315] team393: Port device gre324 added [ 1119.804053][T19325] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1119.804085][T19325] RIP: 0033:0x7ffba087e1ea [ 1119.804102][T19325] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1119.804121][T19325] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1119.859319][T19318] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1119.873716][T19325] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1119.873743][T19325] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1119.873755][T19325] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1119.873766][T19325] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 20:10:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xe803, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1119.873777][T19325] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1119.873800][T19325] [ 1119.903618][T19325] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1119.932460][T19318] team400: entered promiscuous mode [ 1119.932711][T19318] 8021q: adding VLAN 0 to HW filter on device team400 [ 1119.976704][T19332] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1120.041829][T19332] team394: entered promiscuous mode [ 1120.047881][T19332] 8021q: adding VLAN 0 to HW filter on device team394 [ 1120.081719][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1120.096897][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1120.107422][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1120.118713][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1120.128970][T15110] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1120.142352][T15110] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1120.152359][T15110] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1120.162812][T15110] usb 5-1: config 0 descriptor?? [ 1120.228449][T19316] gre332: entered promiscuous mode [ 1120.235644][T19316] team405: Port device gre332 added [ 1120.343005][T19321] gre328: entered promiscuous mode [ 1120.350584][T19321] team400: Port device gre328 added [ 1120.591409][T19333] gre325: entered promiscuous mode [ 1120.607066][T19333] team394: Port device gre325 added [ 1120.728963][T15110] usbhid 5-1:0.0: can't add hid device: -71 [ 1120.734957][T15110] usbhid: probe of 5-1:0.0 failed with error -71 [ 1120.745858][T15110] usb 5-1: USB disconnect, device number 56 20:10:51 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000000)={0x2c, &(0x7f00000000c0)=ANY=[@ANYBLOB="fcff012f32fe4708245a5fa5e23a11744f28907fa3d4b379da3d98fe411dcf65021a95139699de00bcf8d85f94130a4c22adcad5a9488c61ff4c93af23114652de098579f38c739f713ff84b7d79af94491771967f8745c6ff81651654d8797696eb386eab818136549d0e4167eb"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) (async) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f0000000000)={0x2c, &(0x7f00000000c0)=ANY=[@ANYBLOB="fcff012f32fe4708245a5fa5e23a11744f28907fa3d4b379da3d98fe411dcf65021a95139699de00bcf8d85f94130a4c22adcad5a9488c61ff4c93af23114652de098579f38c739f713ff84b7d79af94491771967f8745c6ff81651654d8797696eb386eab818136549d0e4167eb"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) 20:10:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xf401, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:51 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 76) 20:10:51 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe8720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:51 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd4000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:51 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xfffffff0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xffe5, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1121.202150][T19341] loop0: detected capacity change from 0 to 24 [ 1121.208859][T19342] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1121.222942][T19341] FAULT_INJECTION: forcing a failure. [ 1121.222942][T19341] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.246440][T19341] CPU: 0 PID: 19341 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1121.256925][T19341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1121.267019][T19341] Call Trace: [ 1121.270320][T19341] [ 1121.273275][T19341] dump_stack_lvl+0x125/0x1b0 [ 1121.277978][T19341] should_fail_ex+0x496/0x5b0 [ 1121.282663][T19341] should_failslab+0x9/0x20 [ 1121.287172][T19341] __kmem_cache_alloc_node+0x2fd/0x350 [ 1121.292641][T19341] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1121.298405][T19341] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1121.304143][T19341] __kmalloc+0x4c/0x100 [ 1121.308330][T19341] tomoyo_realpath_from_path+0xb9/0x710 [ 1121.313896][T19341] ? tomoyo_fill_path_info+0x233/0x420 [ 1121.319356][T19341] tomoyo_mount_acl+0x1af/0x880 [ 1121.324219][T19341] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 1121.329765][T19341] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1121.335759][T19341] ? tomoyo_domain+0xbd/0x150 [ 1121.340426][T19341] ? tomoyo_profile+0x47/0x60 [ 1121.345107][T19341] tomoyo_mount_permission+0x16d/0x410 [ 1121.350560][T19341] ? tomoyo_mount_permission+0x10b/0x410 [ 1121.356190][T19341] ? tomoyo_mount_acl+0x880/0x880 [ 1121.361221][T19341] security_sb_mount+0x86/0xd0 [ 1121.365984][T19341] path_mount+0x129/0x1ed0 [ 1121.370533][T19341] ? kmem_cache_free+0xf0/0x490 [ 1121.375414][T19341] ? finish_automount+0xa50/0xa50 [ 1121.380447][T19341] ? putname+0x101/0x140 [ 1121.384687][T19341] __x64_sys_mount+0x293/0x310 [ 1121.389499][T19341] ? copy_mnt_ns+0xb60/0xb60 [ 1121.394096][T19341] ? syscall_enter_from_user_mode+0x26/0x80 [ 1121.400010][T19341] do_syscall_64+0x38/0xb0 [ 1121.404424][T19341] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1121.410314][T19341] RIP: 0033:0x7ffba087e1ea [ 1121.414718][T19341] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1121.434426][T19341] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1121.443189][T19341] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea 20:10:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x1000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1121.451155][T19341] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1121.459150][T19341] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1121.467115][T19341] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1121.475120][T19341] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1121.483094][T19341] [ 1121.493646][T19341] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1121.505119][T19342] team395: entered promiscuous mode 20:10:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x2000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1121.532275][T19342] 8021q: adding VLAN 0 to HW filter on device team395 [ 1121.555115][T19349] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:10:52 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 77) 20:10:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x3000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1121.641795][T19349] team401: entered promiscuous mode [ 1121.650869][T19349] 8021q: adding VLAN 0 to HW filter on device team401 [ 1121.677538][ T6580] usb 5-1: new high-speed USB device number 57 using dummy_hcd 20:10:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x4000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1121.700057][T19361] loop0: detected capacity change from 0 to 24 [ 1121.713131][T19350] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1121.725628][T19361] FAULT_INJECTION: forcing a failure. [ 1121.725628][T19361] name failslab, interval 1, probability 0, space 0, times 0 [ 1121.752225][T19361] CPU: 1 PID: 19361 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1121.762713][T19361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1121.772795][T19361] Call Trace: [ 1121.776094][T19361] [ 1121.779041][T19361] dump_stack_lvl+0x125/0x1b0 [ 1121.783749][T19361] should_fail_ex+0x496/0x5b0 [ 1121.788467][T19361] should_failslab+0x9/0x20 [ 1121.793010][T19361] __kmem_cache_alloc_node+0x2fd/0x350 [ 1121.798501][T19361] ? tomoyo_encode2+0x100/0x3d0 [ 1121.803482][T19361] ? tomoyo_encode2+0x100/0x3d0 [ 1121.808368][T19361] __kmalloc+0x4c/0x100 [ 1121.812556][T19361] tomoyo_encode2+0x100/0x3d0 [ 1121.814236][T19350] team406: entered promiscuous mode [ 1121.817248][T19361] ? rcu_is_watching+0x12/0xb0 [ 1121.817292][T19361] tomoyo_encode+0x29/0x50 [ 1121.817321][T19361] tomoyo_realpath_from_path+0x196/0x710 [ 1121.817355][T19361] tomoyo_mount_acl+0x1af/0x880 [ 1121.817387][T19361] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 1121.817429][T19361] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1121.817473][T19361] ? tomoyo_domain+0xbd/0x150 [ 1121.832295][T19350] 8021q: adding VLAN 0 to HW filter on device team406 [ 1121.837549][T19361] ? tomoyo_profile+0x47/0x60 [ 1121.837586][T19361] tomoyo_mount_permission+0x16d/0x410 [ 1121.837614][T19361] ? tomoyo_mount_permission+0x10b/0x410 [ 1121.837642][T19361] ? tomoyo_mount_acl+0x880/0x880 [ 1121.837679][T19361] security_sb_mount+0x86/0xd0 [ 1121.837707][T19361] path_mount+0x129/0x1ed0 [ 1121.837730][T19361] ? kmem_cache_free+0xf0/0x490 [ 1121.837754][T19361] ? finish_automount+0xa50/0xa50 [ 1121.837776][T19361] ? putname+0x101/0x140 [ 1121.837796][T19361] __x64_sys_mount+0x293/0x310 [ 1121.914386][T19361] ? copy_mnt_ns+0xb60/0xb60 [ 1121.919003][T19361] ? syscall_enter_from_user_mode+0x26/0x80 [ 1121.924929][T19361] do_syscall_64+0x38/0xb0 [ 1121.929368][T19361] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1121.935288][T19361] RIP: 0033:0x7ffba087e1ea [ 1121.939724][T19361] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1121.959355][T19361] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1121.967975][T19361] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1121.975975][T19361] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1121.983979][T19361] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1121.991973][T19361] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1121.999972][T19361] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1122.007975][T19361] [ 1122.022362][T19361] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1122.203916][T19352] gre329: entered promiscuous mode [ 1122.225826][T19352] team401: Port device gre329 added [ 1122.257567][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1122.278507][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1122.289439][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1122.300682][ T6580] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1122.315839][ T6580] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1122.333102][ T6580] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1122.342594][ T6580] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1122.357708][ T6580] usb 5-1: config 0 descriptor?? [ 1122.379216][T19351] gre333: entered promiscuous mode [ 1122.386722][T19351] team406: Port device gre333 added [ 1122.500097][T19353] gre326: entered promiscuous mode [ 1122.508710][T19353] team395: Port device gre326 added [ 1123.040768][T19346] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1123.049382][T19346] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1123.267486][ T6580] usbhid 5-1:0.0: can't add hid device: -71 [ 1123.273555][ T6580] usbhid: probe of 5-1:0.0 failed with error -71 [ 1123.281927][ T6580] usb 5-1: USB disconnect, device number 57 20:10:54 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_connect$uac1(0x4, 0xd6, &(0x7f00000000c0)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xc4, 0x3, 0x1, 0x7f, 0x90, 0x7f, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x451c, 0x53}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xb, 0x24, 0x2, 0x1, 0xff, 0x4, 0x20, 0x3, "41df", "b0"}, @format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x1, 0x1, 0x3, 0x1, 'p', "c2"}, @format_type_i_discrete={0x11, 0x24, 0x2, 0x1, 0x8, 0x3, 0x5, 0x2, "3ae5aa76294b24d9f7"}]}, {{0x9, 0x5, 0x1, 0x9, 0x10, 0xc, 0x0, 0x81, {0x7, 0x25, 0x1, 0x3, 0x3, 0x100}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xd, 0x24, 0x2, 0x2, 0x2866, 0x8001, 0xff, "37f90cfd"}, @format_type_i_discrete={0xe, 0x24, 0x2, 0x1, 0x1, 0x2, 0x1f, 0x81, "e05f11da9850"}, @as_header={0x7, 0x24, 0x1, 0x71, 0xe5, 0x3}, @format_type_i_discrete={0xd, 0x24, 0x2, 0x1, 0x80, 0x2, 0x1, 0x2f, "c287123fe5"}, @as_header={0x7, 0x24, 0x1, 0x7f, 0xec, 0x5}, @format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x200, 0x20, 0x1}]}, {{0x9, 0x5, 0x82, 0x9, 0x200, 0x4, 0x2, 0x0, {0x7, 0x25, 0x1, 0x0, 0x33, 0x800}}}}}}}]}}, &(0x7f0000000500)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x57, 0x5, 0x0, 0xff, 0x4}, 0x5, &(0x7f00000001c0)={0x5, 0xf, 0x5}, 0x7, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0xc04}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x419}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x438}}, {0x53, &(0x7f0000000300)=@string={0x53, 0x3, "9691ffc57bc2c85b00fd0e77803181527a4392ef951bfe70a7ff9e6d55c1f442aa98d7e43e48ba647e2db72bacb1a5f363e7ddcc8cfe1d4d968d1f08b359b9fec755049a087493481391c6f38ba5b9a497"}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x812}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0xf0ff}}, {0xe9, &(0x7f0000000400)=@string={0xe9, 0x3, "5693fbd3b0d17179f5b3583fd8f47f17453731d824650d246e5d4880453b5ac2e46671c8c5971b728cd297f0e4e281c2758798c09553315eaeeac01cd074f87531f9ea0ab482360813f783cf907ce853fe083855c71a0c28f993832c71b0ec323dd2fcb92eb0e24ebf433287391d3d2b5ec220e4e919ce1c262f7987b8accb107aedea41599f2904d892d8167e911ad27414b6ad5486238532c3815529664286a8374753a5a263cecc1b42181c0f2c353fa5e11ea7023dda781426ff0e24651f35d48e6712791ef68f1e2f28540e01306221b2d455d4552dcebc70dcdde133dae0a061124ef884"}}]}) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x5000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:54 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 78) 20:10:54 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd4620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:54 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe9720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:54 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xfffffffe, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x6000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1123.792064][T19374] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1123.803084][T19376] loop0: detected capacity change from 0 to 24 [ 1123.814620][T19376] FAULT_INJECTION: forcing a failure. [ 1123.814620][T19376] name failslab, interval 1, probability 0, space 0, times 0 [ 1123.835912][T19376] CPU: 1 PID: 19376 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1123.846428][T19376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1123.856593][T19376] Call Trace: [ 1123.859878][T19376] [ 1123.862808][T19376] dump_stack_lvl+0x125/0x1b0 [ 1123.867488][T19376] should_fail_ex+0x496/0x5b0 [ 1123.872171][T19376] should_failslab+0x9/0x20 [ 1123.876677][T19376] __kmem_cache_alloc_node+0x2fd/0x350 [ 1123.882150][T19376] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1123.887897][T19376] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1123.893629][T19376] __kmalloc+0x4c/0x100 [ 1123.897795][T19376] tomoyo_realpath_from_path+0xb9/0x710 [ 1123.903362][T19376] tomoyo_mount_acl+0x669/0x880 [ 1123.908239][T19376] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 1123.913796][T19376] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1123.919804][T19376] ? tomoyo_domain+0xbd/0x150 [ 1123.924484][T19376] ? tomoyo_profile+0x47/0x60 [ 1123.929178][T19376] tomoyo_mount_permission+0x16d/0x410 [ 1123.934650][T19376] ? tomoyo_mount_permission+0x10b/0x410 [ 1123.940294][T19376] ? tomoyo_mount_acl+0x880/0x880 [ 1123.945339][T19376] security_sb_mount+0x86/0xd0 [ 1123.950121][T19376] path_mount+0x129/0x1ed0 [ 1123.954613][T19376] ? kmem_cache_free+0xf0/0x490 [ 1123.959473][T19376] ? finish_automount+0xa50/0xa50 [ 1123.964499][T19376] ? putname+0x101/0x140 [ 1123.968741][T19376] __x64_sys_mount+0x293/0x310 [ 1123.973505][T19376] ? copy_mnt_ns+0xb60/0xb60 [ 1123.978101][T19376] ? syscall_enter_from_user_mode+0x26/0x80 [ 1123.984004][T19376] do_syscall_64+0x38/0xb0 [ 1123.988422][T19376] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1123.994311][T19376] RIP: 0033:0x7ffba087e1ea [ 1123.998810][T19376] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1124.018512][T19376] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1124.026926][T19376] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1124.034906][T19376] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1124.042882][T19376] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1124.050873][T19376] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1124.058852][T19376] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1124.066976][T19376] [ 1124.083186][T19374] team402: entered promiscuous mode 20:10:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x600f9ff, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1124.089410][T19374] 8021q: adding VLAN 0 to HW filter on device team402 [ 1124.093207][T19376] ERROR: Out of memory at tomoyo_realpath_from_path. 20:10:54 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 79) 20:10:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x7000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1124.239303][T19388] loop0: detected capacity change from 0 to 24 [ 1124.246612][T19388] FAULT_INJECTION: forcing a failure. [ 1124.246612][T19388] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.265878][T12655] usb 5-1: new high-speed USB device number 58 using dummy_hcd [ 1124.272037][T19388] CPU: 0 PID: 19388 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1124.283898][T19388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1124.293985][T19388] Call Trace: [ 1124.297288][T19388] [ 1124.300230][T19388] dump_stack_lvl+0x125/0x1b0 [ 1124.304929][T19388] should_fail_ex+0x496/0x5b0 [ 1124.309824][T19388] should_failslab+0x9/0x20 [ 1124.314360][T19388] __kmem_cache_alloc_node+0x2fd/0x350 [ 1124.319855][T19388] ? alloc_fs_context+0x57/0x9f0 [ 1124.324832][T19388] kmalloc_trace+0x25/0xe0 [ 1124.329310][T19388] alloc_fs_context+0x57/0x9f0 [ 1124.334107][T19388] path_mount+0xae6/0x1ed0 20:10:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x8000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1124.338540][T19388] ? kmem_cache_free+0xf0/0x490 [ 1124.343422][T19388] ? finish_automount+0xa50/0xa50 [ 1124.344285][T19380] gre330: entered promiscuous mode [ 1124.348470][T19388] ? putname+0x101/0x140 [ 1124.348503][T19388] __x64_sys_mount+0x293/0x310 [ 1124.348527][T19388] ? copy_mnt_ns+0xb60/0xb60 [ 1124.348550][T19388] ? syscall_enter_from_user_mode+0x26/0x80 [ 1124.348583][T19388] do_syscall_64+0x38/0xb0 [ 1124.348607][T19388] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1124.348632][T19388] RIP: 0033:0x7ffba087e1ea [ 1124.348649][T19388] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1124.348667][T19388] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1124.348683][T19388] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1124.348694][T19388] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1124.348704][T19388] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1124.348714][T19388] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1124.348724][T19388] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1124.348742][T19388] 20:10:54 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 80) [ 1124.539422][T19380] team402: Port device gre330 added [ 1124.545210][T19381] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1124.569922][T19393] loop0: detected capacity change from 0 to 24 [ 1124.582475][T19381] team396: entered promiscuous mode [ 1124.589837][T19393] FAULT_INJECTION: forcing a failure. [ 1124.589837][T19393] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.607106][T19393] CPU: 0 PID: 19393 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1124.614727][T19381] 8021q: adding VLAN 0 to HW filter on device team396 [ 1124.617531][T19393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1124.617546][T19393] Call Trace: [ 1124.617553][T19393] [ 1124.617560][T19393] dump_stack_lvl+0x125/0x1b0 [ 1124.617590][T19393] should_fail_ex+0x496/0x5b0 [ 1124.617619][T19393] should_failslab+0x9/0x20 [ 1124.654437][T19393] __kmem_cache_alloc_node+0x2fd/0x350 [ 1124.659901][T19393] ? vfs_parse_fs_string+0xc4/0x150 [ 1124.665118][T19393] ? vfs_parse_fs_string+0xc4/0x150 [ 1124.670430][T19393] __kmalloc_node_track_caller+0x4d/0x100 [ 1124.676198][T19393] kmemdup_nul+0x49/0xe0 [ 1124.680445][T19393] vfs_parse_fs_string+0xc4/0x150 [ 1124.685468][T19393] ? vfs_parse_fs_param+0x3c0/0x3c0 [ 1124.690672][T19393] ? __raw_spin_lock_init+0x3a/0x110 [ 1124.695999][T19393] ? romfs_init_fs_context+0xd/0x40 [ 1124.701294][T19393] ? alloc_fs_context+0x5ba/0x9f0 [ 1124.706323][T19393] path_mount+0x652/0x1ed0 [ 1124.710786][T19393] ? kmem_cache_free+0xf0/0x490 [ 1124.715645][T19393] ? finish_automount+0xa50/0xa50 [ 1124.720672][T19393] ? putname+0x101/0x140 [ 1124.724912][T19393] __x64_sys_mount+0x293/0x310 [ 1124.729826][T19393] ? copy_mnt_ns+0xb60/0xb60 [ 1124.734427][T19393] do_syscall_64+0x38/0xb0 [ 1124.738842][T19393] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1124.744732][T19393] RIP: 0033:0x7ffba087e1ea [ 1124.749140][T19393] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1124.768964][T19393] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1124.777556][T19393] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1124.785526][T19393] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1124.793500][T19393] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1124.801470][T19393] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1124.809453][T19393] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1124.817438][T19393] [ 1124.827798][T19382] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1124.847164][T19382] team407: entered promiscuous mode [ 1124.852815][T19382] 8021q: adding VLAN 0 to HW filter on device team407 [ 1124.951285][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1124.962708][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1124.974330][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1124.989664][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1125.001484][T12655] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1125.017609][T12655] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1125.026994][T12655] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1125.051450][T12655] usb 5-1: config 0 descriptor?? [ 1125.058264][T19375] gre327: entered promiscuous mode [ 1125.066803][T19375] team396: Port device gre327 added [ 1125.192768][T19373] gre334: entered promiscuous mode [ 1125.201015][T19373] team407: Port device gre334 added [ 1125.548473][T12655] keytouch 0003:0926:3333.006F: fixing up Keytouch IEC report descriptor [ 1125.562904][T12655] keytouch 0003:0926:3333.006F: usb_submit_urb(out) failed: -90 [ 1125.571518][T12655] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.006F/input/input122 [ 1125.663084][T12655] keytouch 0003:0926:3333.006F: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 1125.751180][ T5045] usb 5-1: USB disconnect, device number 58 20:10:56 executing program 4: syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) (async) r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_connect$uac1(0x4, 0xd6, &(0x7f00000000c0)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xc4, 0x3, 0x1, 0x7f, 0x90, 0x7f, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x451c, 0x53}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xb, 0x24, 0x2, 0x1, 0xff, 0x4, 0x20, 0x3, "41df", "b0"}, @format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x1, 0x1, 0x3, 0x1, 'p', "c2"}, @format_type_i_discrete={0x11, 0x24, 0x2, 0x1, 0x8, 0x3, 0x5, 0x2, "3ae5aa76294b24d9f7"}]}, {{0x9, 0x5, 0x1, 0x9, 0x10, 0xc, 0x0, 0x81, {0x7, 0x25, 0x1, 0x3, 0x3, 0x100}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xd, 0x24, 0x2, 0x2, 0x2866, 0x8001, 0xff, "37f90cfd"}, @format_type_i_discrete={0xe, 0x24, 0x2, 0x1, 0x1, 0x2, 0x1f, 0x81, "e05f11da9850"}, @as_header={0x7, 0x24, 0x1, 0x71, 0xe5, 0x3}, @format_type_i_discrete={0xd, 0x24, 0x2, 0x1, 0x80, 0x2, 0x1, 0x2f, "c287123fe5"}, @as_header={0x7, 0x24, 0x1, 0x7f, 0xec, 0x5}, @format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x200, 0x20, 0x1}]}, {{0x9, 0x5, 0x82, 0x9, 0x200, 0x4, 0x2, 0x0, {0x7, 0x25, 0x1, 0x0, 0x33, 0x800}}}}}}}]}}, &(0x7f0000000500)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x57, 0x5, 0x0, 0xff, 0x4}, 0x5, &(0x7f00000001c0)={0x5, 0xf, 0x5}, 0x7, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0xc04}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x419}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x438}}, {0x53, &(0x7f0000000300)=@string={0x53, 0x3, "9691ffc57bc2c85b00fd0e77803181527a4392ef951bfe70a7ff9e6d55c1f442aa98d7e43e48ba647e2db72bacb1a5f363e7ddcc8cfe1d4d968d1f08b359b9fec755049a087493481391c6f38ba5b9a497"}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x812}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0xf0ff}}, {0xe9, &(0x7f0000000400)=@string={0xe9, 0x3, "5693fbd3b0d17179f5b3583fd8f47f17453731d824650d246e5d4880453b5ac2e46671c8c5971b728cd297f0e4e281c2758798c09553315eaeeac01cd074f87531f9ea0ab482360813f783cf907ce853fe083855c71a0c28f993832c71b0ec323dd2fcb92eb0e24ebf433287391d3d2b5ec220e4e919ce1c262f7987b8accb107aedea41599f2904d892d8167e911ad27414b6ad5486238532c3815529664286a8374753a5a263cecc1b42181c0f2c353fa5e11ea7023dda781426ff0e24651f35d48e6712791ef68f1e2f28540e01306221b2d455d4552dcebc70dcdde133dae0a061124ef884"}}]}) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:56 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd5620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xa000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:56 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 81) 20:10:56 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xffffffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:56 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xea720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xe000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1126.290400][T19398] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1126.301662][T19403] loop0: detected capacity change from 0 to 24 [ 1126.319091][T19405] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy 20:10:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x11000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1126.343209][T19403] FAULT_INJECTION: forcing a failure. [ 1126.343209][T19403] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.350282][T19405] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1126.372708][T19398] team408: entered promiscuous mode [ 1126.378203][T19403] CPU: 1 PID: 19403 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1126.381476][T19398] 8021q: adding VLAN 0 to HW filter on device team408 [ 1126.388615][T19403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1126.388628][T19403] Call Trace: [ 1126.388635][T19403] [ 1126.388642][T19403] dump_stack_lvl+0x125/0x1b0 [ 1126.388673][T19403] should_fail_ex+0x496/0x5b0 [ 1126.388703][T19403] should_failslab+0x9/0x20 [ 1126.425513][T19403] __kmem_cache_alloc_node+0x2fd/0x350 [ 1126.431025][T19403] ? vfs_parse_fs_string+0xc4/0x150 [ 1126.436249][T19403] ? vfs_parse_fs_string+0xc4/0x150 [ 1126.441465][T19403] __kmalloc_node_track_caller+0x4d/0x100 [ 1126.447194][T19403] kmemdup_nul+0x49/0xe0 [ 1126.451436][T19403] vfs_parse_fs_string+0xc4/0x150 [ 1126.456455][T19403] ? vfs_parse_fs_param+0x3c0/0x3c0 [ 1126.461645][T19403] ? __raw_spin_lock_init+0x3a/0x110 [ 1126.467109][T19403] ? romfs_init_fs_context+0xd/0x40 [ 1126.472299][T19403] ? alloc_fs_context+0x5ba/0x9f0 [ 1126.477324][T19403] path_mount+0x652/0x1ed0 [ 1126.481741][T19403] ? kmem_cache_free+0xf0/0x490 [ 1126.486583][T19403] ? finish_automount+0xa50/0xa50 [ 1126.491602][T19403] ? putname+0x101/0x140 [ 1126.495840][T19403] __x64_sys_mount+0x293/0x310 [ 1126.500594][T19403] ? copy_mnt_ns+0xb60/0xb60 [ 1126.505176][T19403] ? syscall_enter_from_user_mode+0x26/0x80 [ 1126.511074][T19403] do_syscall_64+0x38/0xb0 [ 1126.515573][T19403] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1126.521458][T19403] RIP: 0033:0x7ffba087e1ea [ 1126.525866][T19403] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1126.545507][T19403] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1126.553919][T19403] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1126.561898][T19403] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1126.569869][T19403] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1126.577837][T19403] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1126.585798][T19403] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 20:10:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x14000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1126.593772][T19403] 20:10:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x1f000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x24ab0000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x28000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1126.730617][T19398] gre335: entered promiscuous mode [ 1126.748583][T12655] usb 5-1: new high-speed USB device number 59 using dummy_hcd [ 1126.757705][T19398] team408: Port device gre335 added [ 1126.764045][T19409] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1126.816470][T19409] team403: entered promiscuous mode [ 1126.825144][T19409] 8021q: adding VLAN 0 to HW filter on device team403 [ 1126.841475][T19410] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1126.860813][T19410] team397: entered promiscuous mode [ 1126.866278][T19410] 8021q: adding VLAN 0 to HW filter on device team397 [ 1126.976106][T19414] gre328: entered promiscuous mode [ 1126.983996][T19414] team397: Port device gre328 added [ 1127.107939][T19413] gre331: entered promiscuous mode [ 1127.116347][T19413] team403: Port device gre331 added [ 1127.125130][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1127.157888][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1127.177741][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1127.210354][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1127.230174][T12655] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1127.247896][T12655] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1127.256983][T12655] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1127.288944][T12655] usb 5-1: config 0 descriptor?? [ 1127.768418][T12655] keytouch 0003:0926:3333.0070: fixing up Keytouch IEC report descriptor [ 1127.780404][T12655] keytouch 0003:0926:3333.0070: usb_submit_urb(out) failed: -90 [ 1127.789000][T12655] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.0070/input/input123 [ 1127.873099][T12655] keytouch 0003:0926:3333.0070: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 1127.972338][T12655] usb 5-1: USB disconnect, device number 59 20:10:58 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_connect$uac1(0x4, 0xd6, &(0x7f00000000c0)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xc4, 0x3, 0x1, 0x7f, 0x90, 0x7f, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x451c, 0x53}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_continuous={0xb, 0x24, 0x2, 0x1, 0xff, 0x4, 0x20, 0x3, "41df", "b0"}, @format_type_i_continuous={0xa, 0x24, 0x2, 0x1, 0x1, 0x1, 0x3, 0x1, 'p', "c2"}, @format_type_i_discrete={0x11, 0x24, 0x2, 0x1, 0x8, 0x3, 0x5, 0x2, "3ae5aa76294b24d9f7"}]}, {{0x9, 0x5, 0x1, 0x9, 0x10, 0xc, 0x0, 0x81, {0x7, 0x25, 0x1, 0x3, 0x3, 0x100}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xd, 0x24, 0x2, 0x2, 0x2866, 0x8001, 0xff, "37f90cfd"}, @format_type_i_discrete={0xe, 0x24, 0x2, 0x1, 0x1, 0x2, 0x1f, 0x81, "e05f11da9850"}, @as_header={0x7, 0x24, 0x1, 0x71, 0xe5, 0x3}, @format_type_i_discrete={0xd, 0x24, 0x2, 0x1, 0x80, 0x2, 0x1, 0x2f, "c287123fe5"}, @as_header={0x7, 0x24, 0x1, 0x7f, 0xec, 0x5}, @format_type_ii_discrete={0x9, 0x24, 0x2, 0x2, 0x200, 0x20, 0x1}]}, {{0x9, 0x5, 0x82, 0x9, 0x200, 0x4, 0x2, 0x0, {0x7, 0x25, 0x1, 0x0, 0x33, 0x800}}}}}}}]}}, &(0x7f0000000500)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x310, 0x57, 0x5, 0x0, 0xff, 0x4}, 0x5, &(0x7f00000001c0)={0x5, 0xf, 0x5}, 0x7, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0xc04}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x419}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x438}}, {0x53, &(0x7f0000000300)=@string={0x53, 0x3, "9691ffc57bc2c85b00fd0e77803181527a4392ef951bfe70a7ff9e6d55c1f442aa98d7e43e48ba647e2db72bacb1a5f363e7ddcc8cfe1d4d968d1f08b359b9fec755049a087493481391c6f38ba5b9a497"}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x812}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0xf0ff}}, {0xe9, &(0x7f0000000400)=@string={0xe9, 0x3, "5693fbd3b0d17179f5b3583fd8f47f17453731d824650d246e5d4880453b5ac2e46671c8c5971b728cd297f0e4e281c2758798c09553315eaeeac01cd074f87531f9ea0ab482360813f783cf907ce853fe083855c71a0c28f993832c71b0ec323dd2fcb92eb0e24ebf433287391d3d2b5ec220e4e919ce1c262f7987b8accb107aedea41599f2904d892d8167e911ad27414b6ad5486238532c3815529664286a8374753a5a263cecc1b42181c0f2c353fa5e11ea7023dda781426ff0e24651f35d48e6712791ef68f1e2f28540e01306221b2d455d4552dcebc70dcdde133dae0a061124ef884"}}]}) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:10:58 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xeb720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:58 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 82) 20:10:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x36000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:58 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x3, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:10:58 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd6620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1128.505389][T19429] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1128.510920][T19433] loop0: detected capacity change from 0 to 24 [ 1128.523594][T19433] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1128.530982][T19433] FAULT_INJECTION: forcing a failure. [ 1128.530982][T19433] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.548215][T19433] CPU: 0 PID: 19433 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1128.558687][T19433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1128.562547][T19429] team404: entered promiscuous mode [ 1128.568741][T19433] Call Trace: [ 1128.568753][T19433] [ 1128.568762][T19433] dump_stack_lvl+0x125/0x1b0 [ 1128.568793][T19433] should_fail_ex+0x496/0x5b0 [ 1128.568822][T19433] should_failslab+0x9/0x20 [ 1128.568848][T19433] kmem_cache_alloc+0x33a/0x3b0 [ 1128.568875][T19433] getname_kernel+0x52/0x360 [ 1128.568897][T19433] kern_path+0x1d/0x50 [ 1128.568919][T19433] lookup_bdev+0xd9/0x280 [ 1128.568939][T19433] ? bd_abort_claiming+0x90/0x90 [ 1128.568959][T19433] ? lookup_bdev+0x16c/0x280 [ 1128.568978][T19433] ? bd_abort_claiming+0x90/0x90 [ 1128.585444][T19429] 8021q: adding VLAN 0 to HW filter on device team404 [ 1128.589748][T19433] ? kasan_set_track+0x25/0x30 [ 1128.589790][T19433] blkdev_get_by_path+0x82/0x2f0 [ 1128.589814][T19433] ? blkdev_get_by_dev+0x80/0x80 [ 1128.589833][T19433] ? get_tree_mtd+0x1e8/0x860 [ 1128.589860][T19433] ? mtd_set_super+0x1d0/0x1d0 [ 1128.589883][T19433] ? bpf_lsm_sb_eat_lsm_opts+0x9/0x10 [ 1128.589915][T19433] get_tree_bdev+0xe7/0x7d0 [ 1128.589936][T19433] ? romfs_get_tree+0x60/0x60 [ 1128.622596][T19438] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1128.626670][T19433] romfs_get_tree+0x4e/0x60 [ 1128.626704][T19433] vfs_get_tree+0x88/0x350 [ 1128.626726][T19433] path_mount+0x1492/0x1ed0 [ 1128.653134][T19438] team409: entered promiscuous mode [ 1128.657506][T19433] ? kmem_cache_free+0xf0/0x490 [ 1128.657539][T19433] ? finish_automount+0xa50/0xa50 [ 1128.657563][T19433] ? putname+0x101/0x140 [ 1128.657583][T19433] __x64_sys_mount+0x293/0x310 [ 1128.657604][T19433] ? copy_mnt_ns+0xb60/0xb60 [ 1128.657624][T19433] ? syscall_enter_from_user_mode+0x26/0x80 [ 1128.657654][T19433] do_syscall_64+0x38/0xb0 [ 1128.657674][T19433] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1128.657695][T19433] RIP: 0033:0x7ffba087e1ea 20:10:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x40000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x41426592, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x414269e2, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1128.657711][T19433] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1128.657729][T19433] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1128.657749][T19433] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1128.657762][T19433] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1128.657774][T19433] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1128.657786][T19433] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 20:10:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x60000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:10:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0x92654241, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1128.657797][T19433] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1128.657820][T19433] [ 1128.819301][T19433] /dev/loop0: Can't open blockdev [ 1128.825600][T19438] 8021q: adding VLAN 0 to HW filter on device team409 20:10:59 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 83) [ 1128.948602][T19454] loop0: detected capacity change from 0 to 24 [ 1128.955759][T19454] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1128.963067][T19454] FAULT_INJECTION: forcing a failure. [ 1128.963067][T19454] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.967459][T12655] usb 5-1: new high-speed USB device number 60 using dummy_hcd [ 1128.976993][T19454] CPU: 0 PID: 19454 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1128.993675][T19454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1129.003754][T19454] Call Trace: [ 1129.007048][T19454] [ 1129.009983][T19454] dump_stack_lvl+0x125/0x1b0 [ 1129.014690][T19454] should_fail_ex+0x496/0x5b0 [ 1129.019403][T19454] should_failslab+0x9/0x20 [ 1129.023930][T19454] __kmem_cache_alloc_node+0x2fd/0x350 [ 1129.029421][T19454] ? security_sb_alloc+0x1ca/0x260 [ 1129.034565][T19454] ? security_sb_alloc+0x1ca/0x260 [ 1129.039692][T19454] __kmalloc+0x4c/0x100 [ 1129.043866][T19454] security_sb_alloc+0x1ca/0x260 [ 1129.048854][T19454] ? test_single_super+0x10/0x10 [ 1129.053855][T19454] alloc_super+0x236/0xb40 [ 1129.058392][T19454] ? test_single_super+0x10/0x10 [ 1129.063356][T19454] sget_fc+0x142/0x860 [ 1129.067455][T19454] ? set_bdev_super+0x2e0/0x2e0 [ 1129.072340][T19454] get_tree_bdev+0x1cd/0x7d0 [ 1129.076961][T19454] ? romfs_get_tree+0x60/0x60 [ 1129.081634][T19437] gre332: entered promiscuous mode [ 1129.086752][T19454] romfs_get_tree+0x4e/0x60 [ 1129.086783][T19454] vfs_get_tree+0x88/0x350 [ 1129.086805][T19454] path_mount+0x1492/0x1ed0 [ 1129.086827][T19454] ? kmem_cache_free+0xf0/0x490 [ 1129.086850][T19454] ? finish_automount+0xa50/0xa50 [ 1129.086872][T19454] ? putname+0x101/0x140 [ 1129.086897][T19454] __x64_sys_mount+0x293/0x310 [ 1129.086915][T19454] ? copy_mnt_ns+0xb60/0xb60 [ 1129.086932][T19454] ? syscall_enter_from_user_mode+0x26/0x80 [ 1129.086959][T19454] do_syscall_64+0x38/0xb0 [ 1129.086976][T19454] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1129.086994][T19454] RIP: 0033:0x7ffba087e1ea [ 1129.087009][T19454] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1129.087025][T19454] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1129.087041][T19454] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1129.087052][T19454] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1129.087062][T19454] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1129.087072][T19454] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1129.126258][T19437] team404: Port device gre332 added [ 1129.132072][T19454] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1129.132100][T19454] [ 1129.226496][T19439] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1129.255975][T19439] team398: entered promiscuous mode [ 1129.272429][T19439] 8021q: adding VLAN 0 to HW filter on device team398 [ 1129.422662][T19445] gre336: entered promiscuous mode [ 1129.430806][T19445] team409: Port device gre336 added [ 1129.457820][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1129.477871][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1129.497608][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1129.525072][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1129.547379][T12655] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1129.567369][T12655] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1129.576466][T12655] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1129.615325][T12655] usb 5-1: config 0 descriptor?? [ 1129.918595][T12655] keytouch 0003:0926:3333.0071: fixing up Keytouch IEC report descriptor [ 1129.929842][T12655] keytouch 0003:0926:3333.0071: usb_submit_urb(out) failed: -90 [ 1129.939224][T12655] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.0071/input/input124 [ 1130.028959][T12655] keytouch 0003:0926:3333.0071: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 1130.121332][T12655] usb 5-1: USB disconnect, device number 60 20:11:01 executing program 4: r0 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000040)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x20, 0x56e, 0xfe, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x7f, 0x10, 0x5, [{{0x9, 0x4, 0x0, 0xee, 0x1, 0x3, 0x1, 0x2, 0x40, {0x9, 0x21, 0x4, 0x2, 0x1, {0x22, 0x46b}}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x6, 0x4, 0x3f}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0xc1, 0x3f, 0x82}}]}}}]}}]}}, &(0x7f0000000340)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x300, 0x0, 0x8, 0x5, 0x8, 0x40}, 0x8a, &(0x7f00000000c0)={0x5, 0xf, 0x8a, 0x6, [@ssp_cap={0x14, 0x10, 0xa, 0xf8, 0x2, 0x9, 0xf0f, 0x7ff, [0xffc000, 0x3f00]}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x8, 0xae, 0x1, 0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x2, 0x9, 0x800}, @wireless={0xb, 0x10, 0x1, 0x8, 0x6, 0x20, 0xff, 0x2, 0x5}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x8, 0x8, 0x8001}, @generic={0x48, 0x10, 0xb, "81c434255a3db39dd32f3e3ad0229e06c305b57431d7b28023fdeb4d88b3b9a86ee918e23184d1846e96d1fad7df62efccaffb40b151bca8373a54eda819d0cbdbbe99ce32"}]}, 0x6, [{0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x411}}, {0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0xc07}}, {0xf, &(0x7f0000000200)=@string={0xf, 0x3, "df3b85b5362d3400581243b107"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x804}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x280a}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x1809}}]}) r1 = syz_usb_connect$hid(0x1, 0x3f, &(0x7f00000003c0)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x10, 0xdfc, 0x10a, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x3, 0x40, 0x5, [{{0x9, 0x4, 0x0, 0x81, 0x2, 0x3, 0x1, 0x0, 0xaa, {0x9, 0x21, 0x4, 0x2, 0x1, {0x22, 0xd28}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0x7d, 0x7, 0x9}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x3, 0x4, 0x2}}]}}}]}}]}}, &(0x7f00000005c0)={0xa, &(0x7f0000000400)={0xa, 0x6, 0x201, 0x6, 0xe5, 0x6, 0x8, 0x9}, 0x10, &(0x7f0000000440)={0x5, 0xf, 0x10, 0x1, [@wireless={0xb, 0x10, 0x1, 0x2, 0x5a, 0x40, 0x8, 0x6}]}, 0x5, [{0x16, &(0x7f0000000480)=@string={0x16, 0x3, "6b4b17a98bb6286eb77576ed3db5f7f34d7ce67e"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x42b}}, {0x4, &(0x7f0000000500)=@lang_id={0x4, 0x3, 0x818}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x812}}, {0x2d, &(0x7f0000000580)=@string={0x2d, 0x3, "4df9aaec0c6f338cdbedcbec375507d31dc68a212fad639bcb0acc0bee9b1354cc8ce349ab6672660e0d32"}}]}) r2 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f00000008c0)={0x2c, &(0x7f0000000640)={0x20, 0xc, 0xa1, {0xa1, 0x21, "8f02b835de98b49c425a9d901838d1dd619caebd25dec59ff4b1d3106c919ca0d61ea8d771f5a01249fc5166a908002913a943dc0d13dae754730e7192d0f623ef7e8c4e53e27e8b6be49dd448f0994224069f1fb4144d7dec571856a723de4121a668c52e3e5a88001f0c51ada9a8fb13292cb67d6a3cff331765be5460425f3815bd33b816da9dc94755e6097dcf5a958cf9ba72dbbfae26d4a5e7a355ee"}}, &(0x7f0000000700)={0x0, 0x3, 0x8, @string={0x8, 0x3, "a2547d2a1d07"}}, &(0x7f0000000740)={0x0, 0xf, 0xdd, {0x5, 0xf, 0xdd, 0x5, [@ext_cap={0x7, 0x10, 0x2, 0x28, 0x8, 0x0, 0x54d}, @generic={0xa7, 0x10, 0x1, "4b4f06235a5dfa88aef20c01e8223157ad65a2de1b1f2c9723174de0c63379d85f487cdc2ae1ab5a9a8705e3ed0a2040ef29854891ce37339db0c370858625bdcde35be4049d021e3d337e272a8e2caf2bcb32b8e7e69540762ce416e77cdad85f1ada404cd7c9c9779b7eb358fb3bc3c9c1c228772a8fd2bd314099e6958e220f8ac0db5e0d60d0b16527eddd5301c9e37b2bef3c9101fef30302ccb83cd2870d22c809"}, @ssp_cap={0x18, 0x10, 0xa, 0x2, 0x3, 0x80, 0xf00, 0x4, [0xffc0, 0x3fc0, 0x0]}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0xff, 0xa9, 0xff93, 0x6}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x8, 0x8, 0x3}]}}, &(0x7f0000000840)={0x20, 0x29, 0xf, {0xf, 0x29, 0x8, 0x60, 0x0, 0x0, "769f60cf", "1b8a9502"}}, &(0x7f0000000880)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x9, 0x80, 0x8, 0x0, 0x4, 0x6, 0x3}}}, &(0x7f0000000dc0)={0x84, &(0x7f0000000900)={0x0, 0x0, 0xe3, "595c216061c0e975787e492b656a2751f496de3e324e13e513bb19a0bd944f3c5cce2da1d512acd93eaddde4d00a742fb33a2d825388d9afe3b10071e683117e1912af087075a4c2458c9f2930384722f9079a364c20f4bc5d9a73c705c46e0fa9ac74591b27a9e59d6cf0e7bce18b43abb394a32df9ebe344a3d2dff10238864aa767ee021c8db1316e50e59b9190262535aac95a15501c46f1169bf8b909666f8bb548047873e7d9c04a27d8d986d612d1f4304750749389b6f87c67e425980f78de5ad98a77b027d0ae9983bad765d8f5c75591b409f2f16e4ad148a29af9bdc9c4"}, &(0x7f0000000a00)={0x0, 0xa, 0x1, 0x4b}, &(0x7f0000000a40)={0x0, 0x8, 0x1}, &(0x7f0000000a80)={0x20, 0x0, 0x4, {0x1}}, &(0x7f0000000ac0)={0x20, 0x0, 0x8, {0x20, 0x20, [0xf000]}}, &(0x7f0000000b00)={0x40, 0x7, 0x2, 0x9}, &(0x7f0000000b40)={0x40, 0x9, 0x1, 0x46}, &(0x7f0000000b80)={0x40, 0xb, 0x2, "3c17"}, &(0x7f0000000bc0)={0x40, 0xf, 0x2, 0x9}, &(0x7f0000000c00)={0x40, 0x13, 0x6, @multicast}, &(0x7f0000000c40)={0x40, 0x17, 0x6, @local}, &(0x7f0000000c80)={0x40, 0x19, 0x2, 'Dl'}, &(0x7f0000000cc0)={0x40, 0x1a, 0x2, 0x9}, &(0x7f0000000d00)={0x40, 0x1c, 0x1, 0x5}, &(0x7f0000000d40)={0x40, 0x1e, 0x1, 0x5}, &(0x7f0000000d80)={0x40, 0x21, 0x1, 0x4}}) syz_usb_disconnect(r2) r3 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) syz_usb_control_io(r3, 0x0, 0x0) syz_usb_disconnect(r3) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:11:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xe0000000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:01 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd7620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:01 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 84) 20:11:01 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0xa, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:01 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xec720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1130.655265][T19463] loop0: detected capacity change from 0 to 24 [ 1130.661332][T19465] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1130.666594][T19463] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1130.678212][T19463] FAULT_INJECTION: forcing a failure. [ 1130.678212][T19463] name failslab, interval 1, probability 0, space 0, times 0 [ 1130.704303][T19463] CPU: 1 PID: 19463 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1130.714823][T19463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1130.720583][T19465] team405: entered promiscuous mode [ 1130.724888][T19463] Call Trace: [ 1130.724897][T19463] [ 1130.724905][T19463] dump_stack_lvl+0x125/0x1b0 [ 1130.724934][T19463] should_fail_ex+0x496/0x5b0 [ 1130.730595][T19465] 8021q: adding VLAN 0 to HW filter on device team405 [ 1130.733404][T19463] should_failslab+0x9/0x20 [ 1130.733445][T19463] __kmem_cache_alloc_node+0x2fd/0x350 [ 1130.762352][T19463] ? security_sb_alloc+0x1ca/0x260 [ 1130.767479][T19463] ? security_sb_alloc+0x1ca/0x260 [ 1130.772591][T19463] __kmalloc+0x4c/0x100 [ 1130.776752][T19463] security_sb_alloc+0x1ca/0x260 [ 1130.781696][T19463] ? test_single_super+0x10/0x10 [ 1130.786630][T19463] alloc_super+0x236/0xb40 [ 1130.791048][T19463] ? test_single_super+0x10/0x10 [ 1130.795978][T19463] sget_fc+0x142/0x860 [ 1130.800046][T19463] ? set_bdev_super+0x2e0/0x2e0 [ 1130.804896][T19463] get_tree_bdev+0x1cd/0x7d0 [ 1130.809487][T19463] ? romfs_get_tree+0x60/0x60 [ 1130.814164][T19463] romfs_get_tree+0x4e/0x60 [ 1130.818662][T19463] vfs_get_tree+0x88/0x350 [ 1130.823080][T19463] path_mount+0x1492/0x1ed0 [ 1130.827581][T19463] ? kmem_cache_free+0xf0/0x490 [ 1130.832434][T19463] ? finish_automount+0xa50/0xa50 [ 1130.837467][T19463] ? putname+0x101/0x140 [ 1130.841708][T19463] __x64_sys_mount+0x293/0x310 [ 1130.846469][T19463] ? copy_mnt_ns+0xb60/0xb60 [ 1130.851076][T19463] ? syscall_enter_from_user_mode+0x26/0x80 [ 1130.856969][T19463] do_syscall_64+0x38/0xb0 [ 1130.861438][T19463] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1130.867360][T19463] RIP: 0033:0x7ffba087e1ea [ 1130.871777][T19463] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1130.891398][T19463] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 20:11:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xe2694241, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1130.899813][T19463] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1130.907785][T19463] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1130.915754][T19463] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1130.923730][T19463] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1130.931702][T19463] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1130.939683][T19463] 20:11:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xe8030000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xf4010000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:01 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 85) 20:11:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xffe50000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1131.097423][T15110] usb 5-1: new high-speed USB device number 61 using dummy_hcd [ 1131.102175][T19479] loop0: detected capacity change from 0 to 24 [ 1131.118299][T19479] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1131.125268][T19479] FAULT_INJECTION: forcing a failure. [ 1131.125268][T19479] name failslab, interval 1, probability 0, space 0, times 0 20:11:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xfff90006, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1131.152883][T19479] CPU: 1 PID: 19479 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1131.163369][T19479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1131.173446][T19479] Call Trace: [ 1131.176762][T19479] [ 1131.179700][T19479] dump_stack_lvl+0x125/0x1b0 [ 1131.184403][T19479] should_fail_ex+0x496/0x5b0 [ 1131.189126][T19479] should_failslab+0x9/0x20 [ 1131.193671][T19479] kmem_cache_alloc+0x33a/0x3b0 [ 1131.198582][T19479] getname_kernel+0x52/0x360 [ 1131.203224][T19479] kern_path+0x1d/0x50 [ 1131.207327][T19479] lookup_bdev+0xd9/0x280 [ 1131.211686][T19479] ? bd_abort_claiming+0x90/0x90 [ 1131.216652][T19479] ? lookup_bdev+0x16c/0x280 [ 1131.221263][T19479] ? bd_abort_claiming+0x90/0x90 [ 1131.226229][T19479] ? kasan_set_track+0x25/0x30 [ 1131.231021][T19479] blkdev_get_by_path+0x82/0x2f0 [ 1131.235994][T19479] ? blkdev_get_by_dev+0x80/0x80 [ 1131.240955][T19479] ? get_tree_mtd+0x1e8/0x860 [ 1131.245658][T19479] ? mtd_set_super+0x1d0/0x1d0 [ 1131.250458][T19479] ? bpf_lsm_sb_eat_lsm_opts+0x9/0x10 [ 1131.255856][T19479] get_tree_bdev+0xe7/0x7d0 [ 1131.260380][T19479] ? romfs_get_tree+0x60/0x60 [ 1131.265072][T19479] romfs_get_tree+0x4e/0x60 [ 1131.269592][T19479] vfs_get_tree+0x88/0x350 [ 1131.274019][T19479] path_mount+0x1492/0x1ed0 [ 1131.274211][T19469] gre333: entered promiscuous mode [ 1131.278523][T19479] ? kmem_cache_free+0xf0/0x490 [ 1131.278553][T19479] ? finish_automount+0xa50/0xa50 [ 1131.278577][T19479] ? putname+0x101/0x140 [ 1131.278599][T19479] __x64_sys_mount+0x293/0x310 [ 1131.278619][T19479] ? copy_mnt_ns+0xb60/0xb60 [ 1131.278639][T19479] ? syscall_enter_from_user_mode+0x26/0x80 [ 1131.278667][T19479] do_syscall_64+0x38/0xb0 [ 1131.278684][T19479] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1131.278702][T19479] RIP: 0033:0x7ffba087e1ea [ 1131.278716][T19479] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1131.278732][T19479] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1131.278748][T19479] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1131.278758][T19479] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1131.278769][T19479] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1131.278779][T19479] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1131.278789][T19479] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1131.278806][T19479] [ 1131.325169][T19479] /dev/loop0: Can't open blockdev [ 1131.351305][T19469] team405: Port device gre333 added [ 1131.415937][T15110] usb 5-1: Using ep0 maxpacket: 32 [ 1131.456838][T19470] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1131.483273][T19470] team399: entered promiscuous mode [ 1131.489336][T19470] 8021q: adding VLAN 0 to HW filter on device team399 [ 1131.512055][T19471] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1131.533838][T19471] team410: entered promiscuous mode [ 1131.539449][T19471] 8021q: adding VLAN 0 to HW filter on device team410 [ 1131.637641][T15110] usb 5-1: config 1 interface 0 altsetting 238 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 1131.662142][T15110] usb 5-1: config 1 interface 0 has no altsetting 0 [ 1131.703410][T19462] gre337: entered promiscuous mode [ 1131.712676][T19462] team410: Port device gre337 added [ 1131.837739][T15110] usb 5-1: New USB device found, idVendor=056e, idProduct=00fe, bcdDevice= 0.40 [ 1131.846844][T15110] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1131.857033][T15110] usb 5-1: Product: 㯟떅ⴶ4ቘ녃 [ 1131.862413][T15110] usb 5-1: Manufacturer: ఇ [ 1131.867075][T15110] usb 5-1: SerialNumber: ࠄ [ 1132.110229][T19468] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1132.119009][T19468] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1132.128571][T19468] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1132.137382][T19468] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1132.551031][T19468] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1132.561570][T19468] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1132.947482][T15110] usbhid 5-1:1.0: can't add hid device: -71 [ 1132.953573][T15110] usbhid: probe of 5-1:1.0 failed with error -71 [ 1132.963783][T15110] usb 5-1: USB disconnect, device number 61 20:11:03 executing program 4: r0 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000040)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x20, 0x56e, 0xfe, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x7f, 0x10, 0x5, [{{0x9, 0x4, 0x0, 0xee, 0x1, 0x3, 0x1, 0x2, 0x40, {0x9, 0x21, 0x4, 0x2, 0x1, {0x22, 0x46b}}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x6, 0x4, 0x3f}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0xc1, 0x3f, 0x82}}]}}}]}}]}}, &(0x7f0000000340)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x300, 0x0, 0x8, 0x5, 0x8, 0x40}, 0x8a, &(0x7f00000000c0)={0x5, 0xf, 0x8a, 0x6, [@ssp_cap={0x14, 0x10, 0xa, 0xf8, 0x2, 0x9, 0xf0f, 0x7ff, [0xffc000, 0x3f00]}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x8, 0xae, 0x1, 0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x2, 0x9, 0x800}, @wireless={0xb, 0x10, 0x1, 0x8, 0x6, 0x20, 0xff, 0x2, 0x5}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x8, 0x8, 0x8001}, @generic={0x48, 0x10, 0xb, "81c434255a3db39dd32f3e3ad0229e06c305b57431d7b28023fdeb4d88b3b9a86ee918e23184d1846e96d1fad7df62efccaffb40b151bca8373a54eda819d0cbdbbe99ce32"}]}, 0x6, [{0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x411}}, {0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0xc07}}, {0xf, &(0x7f0000000200)=@string={0xf, 0x3, "df3b85b5362d3400581243b107"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x804}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x280a}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x1809}}]}) (async) r1 = syz_usb_connect$hid(0x1, 0x3f, &(0x7f00000003c0)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x10, 0xdfc, 0x10a, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x3, 0x40, 0x5, [{{0x9, 0x4, 0x0, 0x81, 0x2, 0x3, 0x1, 0x0, 0xaa, {0x9, 0x21, 0x4, 0x2, 0x1, {0x22, 0xd28}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0x7d, 0x7, 0x9}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x3, 0x4, 0x2}}]}}}]}}]}}, &(0x7f00000005c0)={0xa, &(0x7f0000000400)={0xa, 0x6, 0x201, 0x6, 0xe5, 0x6, 0x8, 0x9}, 0x10, &(0x7f0000000440)={0x5, 0xf, 0x10, 0x1, [@wireless={0xb, 0x10, 0x1, 0x2, 0x5a, 0x40, 0x8, 0x6}]}, 0x5, [{0x16, &(0x7f0000000480)=@string={0x16, 0x3, "6b4b17a98bb6286eb77576ed3db5f7f34d7ce67e"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x42b}}, {0x4, &(0x7f0000000500)=@lang_id={0x4, 0x3, 0x818}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x812}}, {0x2d, &(0x7f0000000580)=@string={0x2d, 0x3, "4df9aaec0c6f338cdbedcbec375507d31dc68a212fad639bcb0acc0bee9b1354cc8ce349ab6672660e0d32"}}]}) (async) r2 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) syz_usb_control_io(r2, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f00000008c0)={0x2c, &(0x7f0000000640)={0x20, 0xc, 0xa1, {0xa1, 0x21, "8f02b835de98b49c425a9d901838d1dd619caebd25dec59ff4b1d3106c919ca0d61ea8d771f5a01249fc5166a908002913a943dc0d13dae754730e7192d0f623ef7e8c4e53e27e8b6be49dd448f0994224069f1fb4144d7dec571856a723de4121a668c52e3e5a88001f0c51ada9a8fb13292cb67d6a3cff331765be5460425f3815bd33b816da9dc94755e6097dcf5a958cf9ba72dbbfae26d4a5e7a355ee"}}, &(0x7f0000000700)={0x0, 0x3, 0x8, @string={0x8, 0x3, "a2547d2a1d07"}}, &(0x7f0000000740)={0x0, 0xf, 0xdd, {0x5, 0xf, 0xdd, 0x5, [@ext_cap={0x7, 0x10, 0x2, 0x28, 0x8, 0x0, 0x54d}, @generic={0xa7, 0x10, 0x1, "4b4f06235a5dfa88aef20c01e8223157ad65a2de1b1f2c9723174de0c63379d85f487cdc2ae1ab5a9a8705e3ed0a2040ef29854891ce37339db0c370858625bdcde35be4049d021e3d337e272a8e2caf2bcb32b8e7e69540762ce416e77cdad85f1ada404cd7c9c9779b7eb358fb3bc3c9c1c228772a8fd2bd314099e6958e220f8ac0db5e0d60d0b16527eddd5301c9e37b2bef3c9101fef30302ccb83cd2870d22c809"}, @ssp_cap={0x18, 0x10, 0xa, 0x2, 0x3, 0x80, 0xf00, 0x4, [0xffc0, 0x3fc0, 0x0]}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0xff, 0xa9, 0xff93, 0x6}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x8, 0x8, 0x3}]}}, &(0x7f0000000840)={0x20, 0x29, 0xf, {0xf, 0x29, 0x8, 0x60, 0x0, 0x0, "769f60cf", "1b8a9502"}}, &(0x7f0000000880)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x9, 0x80, 0x8, 0x0, 0x4, 0x6, 0x3}}}, &(0x7f0000000dc0)={0x84, &(0x7f0000000900)={0x0, 0x0, 0xe3, "595c216061c0e975787e492b656a2751f496de3e324e13e513bb19a0bd944f3c5cce2da1d512acd93eaddde4d00a742fb33a2d825388d9afe3b10071e683117e1912af087075a4c2458c9f2930384722f9079a364c20f4bc5d9a73c705c46e0fa9ac74591b27a9e59d6cf0e7bce18b43abb394a32df9ebe344a3d2dff10238864aa767ee021c8db1316e50e59b9190262535aac95a15501c46f1169bf8b909666f8bb548047873e7d9c04a27d8d986d612d1f4304750749389b6f87c67e425980f78de5ad98a77b027d0ae9983bad765d8f5c75591b409f2f16e4ad148a29af9bdc9c4"}, &(0x7f0000000a00)={0x0, 0xa, 0x1, 0x4b}, &(0x7f0000000a40)={0x0, 0x8, 0x1}, &(0x7f0000000a80)={0x20, 0x0, 0x4, {0x1}}, &(0x7f0000000ac0)={0x20, 0x0, 0x8, {0x20, 0x20, [0xf000]}}, &(0x7f0000000b00)={0x40, 0x7, 0x2, 0x9}, &(0x7f0000000b40)={0x40, 0x9, 0x1, 0x46}, &(0x7f0000000b80)={0x40, 0xb, 0x2, "3c17"}, &(0x7f0000000bc0)={0x40, 0xf, 0x2, 0x9}, &(0x7f0000000c00)={0x40, 0x13, 0x6, @multicast}, &(0x7f0000000c40)={0x40, 0x17, 0x6, @local}, &(0x7f0000000c80)={0x40, 0x19, 0x2, 'Dl'}, &(0x7f0000000cc0)={0x40, 0x1a, 0x2, 0x9}, &(0x7f0000000d00)={0x40, 0x1c, 0x1, 0x5}, &(0x7f0000000d40)={0x40, 0x1e, 0x1, 0x5}, &(0x7f0000000d80)={0x40, 0x21, 0x1, 0x4}}) (async) syz_usb_disconnect(r2) r3 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) syz_usb_control_io(r3, 0x0, 0x0) syz_usb_disconnect(r3) (async) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:11:03 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 86) 20:11:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty=0xffff0000, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:03 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd8620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:03 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0xf, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:03 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xed720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1133.307186][T19489] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1133.318616][T19491] loop0: detected capacity change from 0 to 24 [ 1133.337171][T19491] MTD: Attempt to mount non-MTD device "/dev/loop0" 20:11:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x2}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1133.357419][T19496] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1133.370044][T19495] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1133.375293][T19491] FAULT_INJECTION: forcing a failure. [ 1133.375293][T19491] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.387098][T19496] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1133.395880][T19489] team406: entered promiscuous mode [ 1133.408080][T19495] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1133.417797][T19489] 8021q: adding VLAN 0 to HW filter on device team406 [ 1133.426590][T19491] CPU: 0 PID: 19491 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1133.437097][T19491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1133.447196][T19491] Call Trace: [ 1133.450493][T19491] [ 1133.453437][T19491] dump_stack_lvl+0x125/0x1b0 [ 1133.458157][T19491] should_fail_ex+0x496/0x5b0 [ 1133.462874][T19491] should_failslab+0x9/0x20 [ 1133.467426][T19491] __kmem_cache_alloc_node+0x2fd/0x350 [ 1133.472918][T19491] ? __list_lru_init+0xd1/0x630 [ 1133.477778][T19491] ? __list_lru_init+0xd1/0x630 [ 1133.482732][T19491] __kmalloc+0x4c/0x100 [ 1133.486895][T19491] __list_lru_init+0xd1/0x630 [ 1133.491579][T19491] alloc_super+0x8c0/0xb40 [ 1133.495995][T19491] ? test_single_super+0x10/0x10 [ 1133.500930][T19491] sget_fc+0x142/0x860 [ 1133.504998][T19491] ? set_bdev_super+0x2e0/0x2e0 [ 1133.509846][T19491] get_tree_bdev+0x1cd/0x7d0 [ 1133.514428][T19491] ? romfs_get_tree+0x60/0x60 [ 1133.519104][T19491] romfs_get_tree+0x4e/0x60 [ 1133.523599][T19491] vfs_get_tree+0x88/0x350 [ 1133.528010][T19491] path_mount+0x1492/0x1ed0 [ 1133.532510][T19491] ? kmem_cache_free+0xf0/0x490 [ 1133.537362][T19491] ? finish_automount+0xa50/0xa50 [ 1133.542384][T19491] ? putname+0x101/0x140 [ 1133.546621][T19491] __x64_sys_mount+0x293/0x310 [ 1133.551382][T19491] ? copy_mnt_ns+0xb60/0xb60 [ 1133.555972][T19491] ? syscall_enter_from_user_mode+0x26/0x80 [ 1133.561868][T19491] do_syscall_64+0x38/0xb0 [ 1133.566278][T19491] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1133.572168][T19491] RIP: 0033:0x7ffba087e1ea [ 1133.576580][T19491] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1133.596212][T19491] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1133.604631][T19491] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1133.612603][T19491] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1133.620571][T19491] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1133.628540][T19491] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1133.636508][T19491] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1133.644491][T19491] 20:11:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x3}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x4}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1133.650889][T19501] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1133.676220][T19501] team400: entered promiscuous mode [ 1133.694052][T19501] 8021q: adding VLAN 0 to HW filter on device team400 20:11:04 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 87) [ 1133.714066][T19502] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:11:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x5}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1133.773769][T19502] team411: entered promiscuous mode [ 1133.800902][T19502] 8021q: adding VLAN 0 to HW filter on device team411 [ 1133.812036][T19513] loop0: detected capacity change from 0 to 24 [ 1133.818673][ T6580] usb 5-1: new high-speed USB device number 62 using dummy_hcd [ 1133.828291][T19513] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1133.835359][T19513] FAULT_INJECTION: forcing a failure. [ 1133.835359][T19513] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.855360][T19513] CPU: 1 PID: 19513 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1133.865860][T19513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1133.875933][T19513] Call Trace: [ 1133.879221][T19513] [ 1133.882160][T19513] dump_stack_lvl+0x125/0x1b0 [ 1133.886868][T19513] should_fail_ex+0x496/0x5b0 [ 1133.891577][T19513] should_failslab+0x9/0x20 [ 1133.896109][T19513] __kmem_cache_alloc_node+0x2fd/0x350 [ 1133.901596][T19513] ? romfs_fill_super+0x240/0x830 [ 1133.906645][T19513] kmalloc_trace+0x25/0xe0 [ 1133.911090][T19513] romfs_fill_super+0x240/0x830 [ 1133.915971][T19513] get_tree_bdev+0x43e/0x7d0 [ 1133.920589][T19513] ? romfs_get_tree+0x60/0x60 [ 1133.925297][T19513] romfs_get_tree+0x4e/0x60 [ 1133.929827][T19513] vfs_get_tree+0x88/0x350 [ 1133.934269][T19513] path_mount+0x1492/0x1ed0 [ 1133.938814][T19513] ? kmem_cache_free+0xf0/0x490 [ 1133.943700][T19513] ? finish_automount+0xa50/0xa50 [ 1133.948747][T19513] ? putname+0x101/0x140 [ 1133.953005][T19513] __x64_sys_mount+0x293/0x310 [ 1133.957794][T19513] ? copy_mnt_ns+0xb60/0xb60 [ 1133.962408][T19513] ? syscall_enter_from_user_mode+0x26/0x80 [ 1133.967238][T19499] gre334: entered promiscuous mode [ 1133.968316][T19513] do_syscall_64+0x38/0xb0 [ 1133.968349][T19513] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1133.968373][T19513] RIP: 0033:0x7ffba087e1ea [ 1133.968390][T19513] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1133.968410][T19513] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1133.968428][T19513] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1133.968445][T19513] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1133.968456][T19513] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1133.968466][T19513] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1133.968477][T19513] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1133.968495][T19513] [ 1134.073297][T19499] team406: Port device gre334 added [ 1134.127660][ T6580] usb 5-1: device descriptor read/64, error 18 [ 1134.407391][ T6580] usb 5-1: new high-speed USB device number 63 using dummy_hcd [ 1134.617412][ T6580] usb 5-1: device descriptor read/64, error 18 [ 1134.741989][ T6580] usb usb5-port1: attempt power cycle [ 1135.167365][ T6580] usb 5-1: new high-speed USB device number 64 using dummy_hcd [ 1135.367684][ T6580] usb 5-1: device descriptor read/8, error -61 [ 1135.637344][ T6580] usb 5-1: new high-speed USB device number 65 using dummy_hcd [ 1135.847470][ T6580] usb 5-1: device descriptor read/8, error -61 [ 1135.967624][ T6580] usb usb5-port1: unable to enumerate USB device 20:11:06 executing program 4: r0 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000040)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x20, 0x56e, 0xfe, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x7f, 0x10, 0x5, [{{0x9, 0x4, 0x0, 0xee, 0x1, 0x3, 0x1, 0x2, 0x40, {0x9, 0x21, 0x4, 0x2, 0x1, {0x22, 0x46b}}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x6, 0x4, 0x3f}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0xc1, 0x3f, 0x82}}]}}}]}}]}}, &(0x7f0000000340)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x300, 0x0, 0x8, 0x5, 0x8, 0x40}, 0x8a, &(0x7f00000000c0)={0x5, 0xf, 0x8a, 0x6, [@ssp_cap={0x14, 0x10, 0xa, 0xf8, 0x2, 0x9, 0xf0f, 0x7ff, [0xffc000, 0x3f00]}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x8, 0xae, 0x1, 0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x2, 0x9, 0x800}, @wireless={0xb, 0x10, 0x1, 0x8, 0x6, 0x20, 0xff, 0x2, 0x5}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x8, 0x8, 0x8001}, @generic={0x48, 0x10, 0xb, "81c434255a3db39dd32f3e3ad0229e06c305b57431d7b28023fdeb4d88b3b9a86ee918e23184d1846e96d1fad7df62efccaffb40b151bca8373a54eda819d0cbdbbe99ce32"}]}, 0x6, [{0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x411}}, {0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0xc07}}, {0xf, &(0x7f0000000200)=@string={0xf, 0x3, "df3b85b5362d3400581243b107"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x804}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x280a}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x1809}}]}) r1 = syz_usb_connect$hid(0x1, 0x3f, &(0x7f00000003c0)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x10, 0xdfc, 0x10a, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x3, 0x40, 0x5, [{{0x9, 0x4, 0x0, 0x81, 0x2, 0x3, 0x1, 0x0, 0xaa, {0x9, 0x21, 0x4, 0x2, 0x1, {0x22, 0xd28}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0x7d, 0x7, 0x9}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x3, 0x4, 0x2}}]}}}]}}]}}, &(0x7f00000005c0)={0xa, &(0x7f0000000400)={0xa, 0x6, 0x201, 0x6, 0xe5, 0x6, 0x8, 0x9}, 0x10, &(0x7f0000000440)={0x5, 0xf, 0x10, 0x1, [@wireless={0xb, 0x10, 0x1, 0x2, 0x5a, 0x40, 0x8, 0x6}]}, 0x5, [{0x16, &(0x7f0000000480)=@string={0x16, 0x3, "6b4b17a98bb6286eb77576ed3db5f7f34d7ce67e"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x42b}}, {0x4, &(0x7f0000000500)=@lang_id={0x4, 0x3, 0x818}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x812}}, {0x2d, &(0x7f0000000580)=@string={0x2d, 0x3, "4df9aaec0c6f338cdbedcbec375507d31dc68a212fad639bcb0acc0bee9b1354cc8ce349ab6672660e0d32"}}]}) r2 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f00000008c0)={0x2c, &(0x7f0000000640)={0x20, 0xc, 0xa1, {0xa1, 0x21, "8f02b835de98b49c425a9d901838d1dd619caebd25dec59ff4b1d3106c919ca0d61ea8d771f5a01249fc5166a908002913a943dc0d13dae754730e7192d0f623ef7e8c4e53e27e8b6be49dd448f0994224069f1fb4144d7dec571856a723de4121a668c52e3e5a88001f0c51ada9a8fb13292cb67d6a3cff331765be5460425f3815bd33b816da9dc94755e6097dcf5a958cf9ba72dbbfae26d4a5e7a355ee"}}, &(0x7f0000000700)={0x0, 0x3, 0x8, @string={0x8, 0x3, "a2547d2a1d07"}}, &(0x7f0000000740)={0x0, 0xf, 0xdd, {0x5, 0xf, 0xdd, 0x5, [@ext_cap={0x7, 0x10, 0x2, 0x28, 0x8, 0x0, 0x54d}, @generic={0xa7, 0x10, 0x1, "4b4f06235a5dfa88aef20c01e8223157ad65a2de1b1f2c9723174de0c63379d85f487cdc2ae1ab5a9a8705e3ed0a2040ef29854891ce37339db0c370858625bdcde35be4049d021e3d337e272a8e2caf2bcb32b8e7e69540762ce416e77cdad85f1ada404cd7c9c9779b7eb358fb3bc3c9c1c228772a8fd2bd314099e6958e220f8ac0db5e0d60d0b16527eddd5301c9e37b2bef3c9101fef30302ccb83cd2870d22c809"}, @ssp_cap={0x18, 0x10, 0xa, 0x2, 0x3, 0x80, 0xf00, 0x4, [0xffc0, 0x3fc0, 0x0]}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0xff, 0xa9, 0xff93, 0x6}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x8, 0x8, 0x3}]}}, &(0x7f0000000840)={0x20, 0x29, 0xf, {0xf, 0x29, 0x8, 0x60, 0x0, 0x0, "769f60cf", "1b8a9502"}}, &(0x7f0000000880)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x9, 0x80, 0x8, 0x0, 0x4, 0x6, 0x3}}}, &(0x7f0000000dc0)={0x84, &(0x7f0000000900)={0x0, 0x0, 0xe3, "595c216061c0e975787e492b656a2751f496de3e324e13e513bb19a0bd944f3c5cce2da1d512acd93eaddde4d00a742fb33a2d825388d9afe3b10071e683117e1912af087075a4c2458c9f2930384722f9079a364c20f4bc5d9a73c705c46e0fa9ac74591b27a9e59d6cf0e7bce18b43abb394a32df9ebe344a3d2dff10238864aa767ee021c8db1316e50e59b9190262535aac95a15501c46f1169bf8b909666f8bb548047873e7d9c04a27d8d986d612d1f4304750749389b6f87c67e425980f78de5ad98a77b027d0ae9983bad765d8f5c75591b409f2f16e4ad148a29af9bdc9c4"}, &(0x7f0000000a00)={0x0, 0xa, 0x1, 0x4b}, &(0x7f0000000a40)={0x0, 0x8, 0x1}, &(0x7f0000000a80)={0x20, 0x0, 0x4, {0x1}}, &(0x7f0000000ac0)={0x20, 0x0, 0x8, {0x20, 0x20, [0xf000]}}, &(0x7f0000000b00)={0x40, 0x7, 0x2, 0x9}, &(0x7f0000000b40)={0x40, 0x9, 0x1, 0x46}, &(0x7f0000000b80)={0x40, 0xb, 0x2, "3c17"}, &(0x7f0000000bc0)={0x40, 0xf, 0x2, 0x9}, &(0x7f0000000c00)={0x40, 0x13, 0x6, @multicast}, &(0x7f0000000c40)={0x40, 0x17, 0x6, @local}, &(0x7f0000000c80)={0x40, 0x19, 0x2, 'Dl'}, &(0x7f0000000cc0)={0x40, 0x1a, 0x2, 0x9}, &(0x7f0000000d00)={0x40, 0x1c, 0x1, 0x5}, &(0x7f0000000d40)={0x40, 0x1e, 0x1, 0x5}, &(0x7f0000000d80)={0x40, 0x21, 0x1, 0x4}}) syz_usb_disconnect(r2) r3 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) syz_usb_control_io(r3, 0x0, 0x0) syz_usb_disconnect(r3) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000040)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x20, 0x56e, 0xfe, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x7f, 0x10, 0x5, [{{0x9, 0x4, 0x0, 0xee, 0x1, 0x3, 0x1, 0x2, 0x40, {0x9, 0x21, 0x4, 0x2, 0x1, {0x22, 0x46b}}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x6, 0x4, 0x3f}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0xc1, 0x3f, 0x82}}]}}}]}}]}}, &(0x7f0000000340)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x300, 0x0, 0x8, 0x5, 0x8, 0x40}, 0x8a, &(0x7f00000000c0)={0x5, 0xf, 0x8a, 0x6, [@ssp_cap={0x14, 0x10, 0xa, 0xf8, 0x2, 0x9, 0xf0f, 0x7ff, [0xffc000, 0x3f00]}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x8, 0xae, 0x1, 0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x2, 0x9, 0x800}, @wireless={0xb, 0x10, 0x1, 0x8, 0x6, 0x20, 0xff, 0x2, 0x5}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x8, 0x8, 0x8001}, @generic={0x48, 0x10, 0xb, "81c434255a3db39dd32f3e3ad0229e06c305b57431d7b28023fdeb4d88b3b9a86ee918e23184d1846e96d1fad7df62efccaffb40b151bca8373a54eda819d0cbdbbe99ce32"}]}, 0x6, [{0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x411}}, {0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0xc07}}, {0xf, &(0x7f0000000200)=@string={0xf, 0x3, "df3b85b5362d3400581243b107"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x804}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x280a}}, {0x4, &(0x7f0000000300)=@lang_id={0x4, 0x3, 0x1809}}]}) (async) syz_usb_connect$hid(0x1, 0x3f, &(0x7f00000003c0)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x10, 0xdfc, 0x10a, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x3, 0x40, 0x5, [{{0x9, 0x4, 0x0, 0x81, 0x2, 0x3, 0x1, 0x0, 0xaa, {0x9, 0x21, 0x4, 0x2, 0x1, {0x22, 0xd28}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0x7d, 0x7, 0x9}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x3, 0x4, 0x2}}]}}}]}}]}}, &(0x7f00000005c0)={0xa, &(0x7f0000000400)={0xa, 0x6, 0x201, 0x6, 0xe5, 0x6, 0x8, 0x9}, 0x10, &(0x7f0000000440)={0x5, 0xf, 0x10, 0x1, [@wireless={0xb, 0x10, 0x1, 0x2, 0x5a, 0x40, 0x8, 0x6}]}, 0x5, [{0x16, &(0x7f0000000480)=@string={0x16, 0x3, "6b4b17a98bb6286eb77576ed3db5f7f34d7ce67e"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x42b}}, {0x4, &(0x7f0000000500)=@lang_id={0x4, 0x3, 0x818}}, {0x4, &(0x7f0000000540)=@lang_id={0x4, 0x3, 0x812}}, {0x2d, &(0x7f0000000580)=@string={0x2d, 0x3, "4df9aaec0c6f338cdbedcbec375507d31dc68a212fad639bcb0acc0bee9b1354cc8ce349ab6672660e0d32"}}]}) (async) syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) (async) syz_usb_control_io(r2, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f00000008c0)={0x2c, &(0x7f0000000640)={0x20, 0xc, 0xa1, {0xa1, 0x21, "8f02b835de98b49c425a9d901838d1dd619caebd25dec59ff4b1d3106c919ca0d61ea8d771f5a01249fc5166a908002913a943dc0d13dae754730e7192d0f623ef7e8c4e53e27e8b6be49dd448f0994224069f1fb4144d7dec571856a723de4121a668c52e3e5a88001f0c51ada9a8fb13292cb67d6a3cff331765be5460425f3815bd33b816da9dc94755e6097dcf5a958cf9ba72dbbfae26d4a5e7a355ee"}}, &(0x7f0000000700)={0x0, 0x3, 0x8, @string={0x8, 0x3, "a2547d2a1d07"}}, &(0x7f0000000740)={0x0, 0xf, 0xdd, {0x5, 0xf, 0xdd, 0x5, [@ext_cap={0x7, 0x10, 0x2, 0x28, 0x8, 0x0, 0x54d}, @generic={0xa7, 0x10, 0x1, "4b4f06235a5dfa88aef20c01e8223157ad65a2de1b1f2c9723174de0c63379d85f487cdc2ae1ab5a9a8705e3ed0a2040ef29854891ce37339db0c370858625bdcde35be4049d021e3d337e272a8e2caf2bcb32b8e7e69540762ce416e77cdad85f1ada404cd7c9c9779b7eb358fb3bc3c9c1c228772a8fd2bd314099e6958e220f8ac0db5e0d60d0b16527eddd5301c9e37b2bef3c9101fef30302ccb83cd2870d22c809"}, @ssp_cap={0x18, 0x10, 0xa, 0x2, 0x3, 0x80, 0xf00, 0x4, [0xffc0, 0x3fc0, 0x0]}, @wireless={0xb, 0x10, 0x1, 0xc, 0x4, 0xff, 0xa9, 0xff93, 0x6}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x8, 0x8, 0x3}]}}, &(0x7f0000000840)={0x20, 0x29, 0xf, {0xf, 0x29, 0x8, 0x60, 0x0, 0x0, "769f60cf", "1b8a9502"}}, &(0x7f0000000880)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x9, 0x80, 0x8, 0x0, 0x4, 0x6, 0x3}}}, &(0x7f0000000dc0)={0x84, &(0x7f0000000900)={0x0, 0x0, 0xe3, "595c216061c0e975787e492b656a2751f496de3e324e13e513bb19a0bd944f3c5cce2da1d512acd93eaddde4d00a742fb33a2d825388d9afe3b10071e683117e1912af087075a4c2458c9f2930384722f9079a364c20f4bc5d9a73c705c46e0fa9ac74591b27a9e59d6cf0e7bce18b43abb394a32df9ebe344a3d2dff10238864aa767ee021c8db1316e50e59b9190262535aac95a15501c46f1169bf8b909666f8bb548047873e7d9c04a27d8d986d612d1f4304750749389b6f87c67e425980f78de5ad98a77b027d0ae9983bad765d8f5c75591b409f2f16e4ad148a29af9bdc9c4"}, &(0x7f0000000a00)={0x0, 0xa, 0x1, 0x4b}, &(0x7f0000000a40)={0x0, 0x8, 0x1}, &(0x7f0000000a80)={0x20, 0x0, 0x4, {0x1}}, &(0x7f0000000ac0)={0x20, 0x0, 0x8, {0x20, 0x20, [0xf000]}}, &(0x7f0000000b00)={0x40, 0x7, 0x2, 0x9}, &(0x7f0000000b40)={0x40, 0x9, 0x1, 0x46}, &(0x7f0000000b80)={0x40, 0xb, 0x2, "3c17"}, &(0x7f0000000bc0)={0x40, 0xf, 0x2, 0x9}, &(0x7f0000000c00)={0x40, 0x13, 0x6, @multicast}, &(0x7f0000000c40)={0x40, 0x17, 0x6, @local}, &(0x7f0000000c80)={0x40, 0x19, 0x2, 'Dl'}, &(0x7f0000000cc0)={0x40, 0x1a, 0x2, 0x9}, &(0x7f0000000d00)={0x40, 0x1c, 0x1, 0x5}, &(0x7f0000000d40)={0x40, 0x1e, 0x1, 0x5}, &(0x7f0000000d80)={0x40, 0x21, 0x1, 0x4}}) (async) syz_usb_disconnect(r2) (async) syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) (async) syz_usb_control_io(r3, 0x0, 0x0) (async) syz_usb_disconnect(r3) (async) syz_usb_control_io$hid(r1, 0x0, 0x0) (async) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) 20:11:06 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x10, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x6}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:06 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xee720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:06 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 88) 20:11:06 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd86a0171, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x7}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1136.367191][T19525] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1136.368754][T19521] loop0: detected capacity change from 0 to 24 [ 1136.393162][T19521] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1136.402238][T19521] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1136.410090][T19521] FAULT_INJECTION: forcing a failure. [ 1136.410090][T19521] name failslab, interval 1, probability 0, space 0, times 0 [ 1136.416901][T19525] team407: entered promiscuous mode [ 1136.425383][T19521] CPU: 1 PID: 19521 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1136.438531][T19521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1136.447126][T19525] 8021q: adding VLAN 0 to HW filter on device team407 [ 1136.448586][T19521] Call Trace: [ 1136.448595][T19521] [ 1136.448602][T19521] dump_stack_lvl+0x125/0x1b0 [ 1136.448636][T19521] should_fail_ex+0x496/0x5b0 [ 1136.448665][T19521] ? alloc_inode+0x5d/0x220 [ 1136.448690][T19521] should_failslab+0x9/0x20 [ 1136.448715][T19521] kmem_cache_alloc_lru+0x3e6/0x630 [ 1136.448738][T19521] ? spin_bug+0x1d0/0x1d0 [ 1136.448767][T19521] ? romfs_free_inode+0x20/0x20 [ 1136.448784][T19521] ? alloc_inode+0x5d/0x220 [ 1136.448804][T19521] alloc_inode+0x5d/0x220 [ 1136.448825][T19521] iget_locked+0x1b3/0x700 [ 1136.448848][T19521] romfs_iget+0x176/0x750 [ 1136.448868][T19521] ? romfs_readdir+0x550/0x550 [ 1136.516638][T19521] ? romfs_fill_super+0x5cf/0x830 [ 1136.521686][T19521] romfs_fill_super+0x5df/0x830 [ 1136.526538][T19521] get_tree_bdev+0x43e/0x7d0 [ 1136.531126][T19521] ? romfs_get_tree+0x60/0x60 [ 1136.535801][T19521] romfs_get_tree+0x4e/0x60 [ 1136.540301][T19521] vfs_get_tree+0x88/0x350 [ 1136.544714][T19521] path_mount+0x1492/0x1ed0 [ 1136.549217][T19521] ? kmem_cache_free+0xf0/0x490 [ 1136.554067][T19521] ? finish_automount+0xa50/0xa50 [ 1136.559091][T19521] ? putname+0x101/0x140 [ 1136.563334][T19521] __x64_sys_mount+0x293/0x310 [ 1136.568098][T19521] ? copy_mnt_ns+0xb60/0xb60 [ 1136.572684][T19521] ? syscall_enter_from_user_mode+0x26/0x80 [ 1136.578581][T19521] do_syscall_64+0x38/0xb0 [ 1136.582991][T19521] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1136.588879][T19521] RIP: 0033:0x7ffba087e1ea [ 1136.593290][T19521] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 20:11:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x8}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1136.612931][T19521] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1136.621343][T19521] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1136.629309][T19521] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1136.637277][T19521] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1136.645255][T19521] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1136.653223][T19521] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1136.661202][T19521] 20:11:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xa}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1136.678658][T19524] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1136.717238][T19524] team412: entered promiscuous mode 20:11:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xe}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1136.723117][T19524] 8021q: adding VLAN 0 to HW filter on device team412 20:11:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x11}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:07 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 89) [ 1136.833213][T19542] loop0: detected capacity change from 0 to 24 [ 1136.842625][T19542] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1136.862686][T19542] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1136.871063][T19542] FAULT_INJECTION: forcing a failure. [ 1136.871063][T19542] name failslab, interval 1, probability 0, space 0, times 0 [ 1136.891875][T19542] CPU: 0 PID: 19542 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1136.902346][T19542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1136.912442][T19542] Call Trace: [ 1136.915743][T19542] [ 1136.918690][T19542] dump_stack_lvl+0x125/0x1b0 [ 1136.923388][T19542] should_fail_ex+0x496/0x5b0 [ 1136.928091][T19542] ? alloc_inode+0x5d/0x220 [ 1136.932617][T19542] should_failslab+0x9/0x20 [ 1136.937147][T19542] kmem_cache_alloc_lru+0x3e6/0x630 [ 1136.939499][T19528] gre338: entered promiscuous mode [ 1136.942366][T19542] ? spin_bug+0x1d0/0x1d0 [ 1136.942406][T19542] ? romfs_free_inode+0x20/0x20 [ 1136.942425][T19542] ? alloc_inode+0x5d/0x220 [ 1136.942447][T19542] alloc_inode+0x5d/0x220 [ 1136.942470][T19542] iget_locked+0x1b3/0x700 [ 1136.942492][T19542] romfs_iget+0x176/0x750 [ 1136.942508][T19542] ? romfs_readdir+0x550/0x550 [ 1136.942521][T19542] ? romfs_fill_super+0x5cf/0x830 [ 1136.942540][T19542] romfs_fill_super+0x5df/0x830 [ 1136.942558][T19542] get_tree_bdev+0x43e/0x7d0 [ 1136.942575][T19542] ? romfs_get_tree+0x60/0x60 [ 1136.942591][T19542] romfs_get_tree+0x4e/0x60 [ 1136.942606][T19542] vfs_get_tree+0x88/0x350 [ 1136.942622][T19542] path_mount+0x1492/0x1ed0 [ 1136.942640][T19542] ? kmem_cache_free+0xf0/0x490 [ 1136.965795][T19528] team412: Port device gre338 added [ 1136.967444][T19542] ? finish_automount+0xa50/0xa50 [ 1136.967480][T19542] ? putname+0x101/0x140 [ 1136.967501][T19542] __x64_sys_mount+0x293/0x310 [ 1137.037316][T19542] ? copy_mnt_ns+0xb60/0xb60 [ 1137.041923][T19542] ? syscall_enter_from_user_mode+0x26/0x80 [ 1137.047817][T19542] do_syscall_64+0x38/0xb0 [ 1137.052231][T19542] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1137.058121][T19542] RIP: 0033:0x7ffba087e1ea [ 1137.062527][T19542] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1137.082163][T19542] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1137.090574][T19542] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1137.098636][T19542] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1137.106608][T19542] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1137.114579][T19542] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1137.122546][T19542] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1137.130521][T19542] [ 1137.139602][ T8059] usb 5-1: new high-speed USB device number 66 using dummy_hcd [ 1137.253369][T19532] gre335: entered promiscuous mode [ 1137.262319][T19532] team407: Port device gre335 added [ 1137.270063][T19533] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1137.377578][ T8059] usb 5-1: Using ep0 maxpacket: 32 [ 1137.577539][ T8059] usb 5-1: config 1 interface 0 altsetting 238 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 1137.590703][ T8059] usb 5-1: config 1 interface 0 has no altsetting 0 [ 1137.757437][ T8059] usb 5-1: New USB device found, idVendor=056e, idProduct=00fe, bcdDevice= 0.40 [ 1137.766506][ T8059] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1137.777796][ T8059] usb 5-1: Product: 㯟떅ⴶ4ቘ녃 [ 1137.783083][ T8059] usb 5-1: Manufacturer: ఇ [ 1137.789936][ T8059] usb 5-1: SerialNumber: ࠄ [ 1138.029646][T19527] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1138.038298][T19527] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1138.046476][T19527] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1138.055456][T19527] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1138.470769][T19527] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1138.481070][T19527] misc raw-gadget: fail, usb_gadget_register_driver returned -16 20:11:09 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009310000000122010009058103000000000009050203"], 0x0) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x10, 0x45e, 0x48, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3f, 0x80, 0x80, [{{0x9, 0x4, 0x0, 0x54, 0x1, 0x3, 0x1, 0x3, 0x7f, {0x9, 0x21, 0xe8ce, 0x97, 0x1, {0x22, 0x2c6}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x7, 0x8, 0x9}}}}}]}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x300, 0x4, 0x9, 0x7, 0x8, 0x81}, 0xc, &(0x7f00000000c0)={0x5, 0xf, 0xc, 0x1, [@ext_cap={0x7, 0x10, 0x2, 0x2, 0x6, 0x6, 0xa0}]}, 0x3, [{0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x1401}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x430}}, {0x9d, &(0x7f0000000180)=@string={0x9d, 0x3, "c8d0ad79e18296d88eae211d68fec9d1a707b371463011793dff53e67feb926207bdcd3bd6f4c8606536bea935b878cc90c7b0870ee55de3743bbe05e5c90a462d2226870aa1ff1519dc42083c0f980b9ab059218d29ff20ec916d1178ce4c7f7a08f7310ffe54c3087eb49ef79e8845fc13aeb23b0a3f1c67f37ca38def3899d4ac3755c572f964dcd60c3cafc250aae513b31c6fb6570f4960c1"}}]}) syz_usb_control_io$hid(r0, 0x0, 0x0) 20:11:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x14}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:09 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xef720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:09 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 90) 20:11:09 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xd9620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:09 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x12, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1138.692085][T19527] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1138.712671][T19527] misc raw-gadget: fail, usb_gadget_register_driver returned -16 20:11:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x28}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1138.743694][T19554] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:11:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x36}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1138.788305][T19554] team401: entered promiscuous mode [ 1138.796965][T19554] 8021q: adding VLAN 0 to HW filter on device team401 [ 1138.816699][T19565] loop0: detected capacity change from 0 to 24 20:11:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x60}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1138.838439][T19565] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1138.845488][T19566] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1138.865366][T19566] team408: entered promiscuous mode [ 1138.868032][T19565] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1138.873607][T19566] 8021q: adding VLAN 0 to HW filter on device team408 [ 1138.898472][T19565] FAULT_INJECTION: forcing a failure. [ 1138.898472][T19565] name failslab, interval 1, probability 0, space 0, times 0 [ 1138.904611][T19567] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1138.919007][T19565] CPU: 1 PID: 19565 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1138.927695][ T8059] usbhid 5-1:1.0: can't add hid device: -71 [ 1138.930904][T19565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1138.936909][ T8059] usbhid: probe of 5-1:1.0 failed with error -71 [ 1138.946821][T19565] Call Trace: [ 1138.946830][T19565] [ 1138.946838][T19565] dump_stack_lvl+0x125/0x1b0 [ 1138.946866][T19565] should_fail_ex+0x496/0x5b0 [ 1138.946900][T19565] ? alloc_inode+0x5d/0x220 [ 1138.946922][T19565] should_failslab+0x9/0x20 [ 1138.946949][T19565] kmem_cache_alloc_lru+0x3e6/0x630 [ 1138.978907][T19567] team413: entered promiscuous mode [ 1138.982977][T19565] ? spin_bug+0x1d0/0x1d0 [ 1138.983017][T19565] ? romfs_free_inode+0x20/0x20 [ 1138.983036][T19565] ? alloc_inode+0x5d/0x220 [ 1138.989790][ T8059] usb 5-1: USB disconnect, device number 66 [ 1138.992522][T19565] alloc_inode+0x5d/0x220 [ 1138.992555][T19565] iget_locked+0x1b3/0x700 [ 1139.012186][T19567] 8021q: adding VLAN 0 to HW filter on device team413 [ 1139.016496][T19565] romfs_iget+0x176/0x750 [ 1139.016526][T19565] ? romfs_readdir+0x550/0x550 [ 1139.016543][T19565] ? romfs_fill_super+0x5cf/0x830 [ 1139.037469][T19565] romfs_fill_super+0x5df/0x830 [ 1139.042389][T19565] get_tree_bdev+0x43e/0x7d0 20:11:09 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x25, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1139.047021][T19565] ? romfs_get_tree+0x60/0x60 [ 1139.051722][T19565] romfs_get_tree+0x4e/0x60 [ 1139.056264][T19565] vfs_get_tree+0x88/0x350 [ 1139.060710][T19565] path_mount+0x1492/0x1ed0 [ 1139.065253][T19565] ? kmem_cache_free+0xf0/0x490 [ 1139.070141][T19565] ? finish_automount+0xa50/0xa50 [ 1139.075286][T19565] ? putname+0x101/0x140 [ 1139.079559][T19565] __x64_sys_mount+0x293/0x310 [ 1139.084351][T19565] ? copy_mnt_ns+0xb60/0xb60 [ 1139.089012][T19565] ? syscall_enter_from_user_mode+0x26/0x80 [ 1139.094948][T19565] do_syscall_64+0x38/0xb0 [ 1139.099394][T19565] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1139.105313][T19565] RIP: 0033:0x7ffba087e1ea [ 1139.109747][T19565] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1139.129378][T19565] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1139.137813][T19565] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea 20:11:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xe0}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x1f4}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1139.145803][T19565] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1139.153794][T19565] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1139.161794][T19565] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1139.169794][T19565] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1139.177804][T19565] [ 1139.304318][T19558] gre339: entered promiscuous mode [ 1139.323624][T19558] team413: Port device gre339 added [ 1139.407462][ T8059] usb 5-1: new high-speed USB device number 67 using dummy_hcd [ 1139.441247][T19559] gre336: entered promiscuous mode [ 1139.449388][T19559] team408: Port device gre336 added [ 1139.455072][T19579] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1139.482062][T19579] team402: entered promiscuous mode [ 1139.490667][T19579] 8021q: adding VLAN 0 to HW filter on device team402 [ 1139.510921][T19580] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1139.777462][ T8059] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1139.788608][ T8059] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1139.798396][ T8059] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1139.809701][ T8059] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1139.819842][ T8059] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1139.832918][ T8059] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1139.843407][ T8059] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1139.855905][ T8059] usb 5-1: config 0 descriptor?? 20:11:12 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009310000000122010009058103000000000009050203"], 0x0) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x10, 0x45e, 0x48, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3f, 0x80, 0x80, [{{0x9, 0x4, 0x0, 0x54, 0x1, 0x3, 0x1, 0x3, 0x7f, {0x9, 0x21, 0xe8ce, 0x97, 0x1, {0x22, 0x2c6}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x7, 0x8, 0x9}}}}}]}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x300, 0x4, 0x9, 0x7, 0x8, 0x81}, 0xc, &(0x7f00000000c0)={0x5, 0xf, 0xc, 0x1, [@ext_cap={0x7, 0x10, 0x2, 0x2, 0x6, 0x6, 0xa0}]}, 0x3, [{0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x1401}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x430}}, {0x9d, &(0x7f0000000180)=@string={0x9d, 0x3, "c8d0ad79e18296d88eae211d68fec9d1a707b371463011793dff53e67feb926207bdcd3bd6f4c8606536bea935b878cc90c7b0870ee55de3743bbe05e5c90a462d2226870aa1ff1519dc42083c0f980b9ab059218d29ff20ec916d1178ce4c7f7a08f7310ffe54c3087eb49ef79e8845fc13aeb23b0a3f1c67f37ca38def3899d4ac3755c572f964dcd60c3cafc250aae513b31c6fb6570f4960c1"}}]}) (async) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x10, 0x45e, 0x48, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3f, 0x80, 0x80, [{{0x9, 0x4, 0x0, 0x54, 0x1, 0x3, 0x1, 0x3, 0x7f, {0x9, 0x21, 0xe8ce, 0x97, 0x1, {0x22, 0x2c6}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x7, 0x8, 0x9}}}}}]}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x300, 0x4, 0x9, 0x7, 0x8, 0x81}, 0xc, &(0x7f00000000c0)={0x5, 0xf, 0xc, 0x1, [@ext_cap={0x7, 0x10, 0x2, 0x2, 0x6, 0x6, 0xa0}]}, 0x3, [{0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x1401}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x430}}, {0x9d, &(0x7f0000000180)=@string={0x9d, 0x3, "c8d0ad79e18296d88eae211d68fec9d1a707b371463011793dff53e67feb926207bdcd3bd6f4c8606536bea935b878cc90c7b0870ee55de3743bbe05e5c90a462d2226870aa1ff1519dc42083c0f980b9ab059218d29ff20ec916d1178ce4c7f7a08f7310ffe54c3087eb49ef79e8845fc13aeb23b0a3f1c67f37ca38def3899d4ac3755c572f964dcd60c3cafc250aae513b31c6fb6570f4960c1"}}]}) syz_usb_control_io$hid(r0, 0x0, 0x0) 20:11:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x300}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:12 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 91) 20:11:12 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xda620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:12 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xf0720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:12 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x140, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1141.794419][T12659] usb 5-1: USB disconnect, device number 67 20:11:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x3e8}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1141.857655][T19587] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1141.871450][T19590] loop0: detected capacity change from 0 to 24 [ 1141.894625][T19590] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1141.901962][T19587] team414: entered promiscuous mode 20:11:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x500}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1141.907126][T19590] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1141.913948][T19587] 8021q: adding VLAN 0 to HW filter on device team414 [ 1141.917778][T19590] FAULT_INJECTION: forcing a failure. [ 1141.917778][T19590] name failslab, interval 1, probability 0, space 0, times 0 [ 1141.946225][T19590] CPU: 0 PID: 19590 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1141.956678][T19590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1141.966752][T19590] Call Trace: [ 1141.970058][T19590] [ 1141.972990][T19590] dump_stack_lvl+0x125/0x1b0 [ 1141.977672][T19590] should_fail_ex+0x496/0x5b0 [ 1141.982366][T19590] should_failslab+0x9/0x20 [ 1141.986862][T19590] __kmem_cache_alloc_node+0x2fd/0x350 [ 1141.992318][T19590] ? memcg_list_lru_alloc+0x534/0xa80 [ 1141.997708][T19590] ? memcg_list_lru_alloc+0x534/0xa80 [ 1142.003091][T19590] __kmalloc+0x4c/0x100 20:11:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x600}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1142.007241][T19590] memcg_list_lru_alloc+0x534/0xa80 [ 1142.012464][T19590] ? find_held_lock+0x2d/0x110 [ 1142.017282][T19590] ? memcg_reparent_list_lrus+0x8d0/0x8d0 [ 1142.023008][T19590] ? kmem_cache_alloc_lru+0x107/0x630 [ 1142.028387][T19590] ? alloc_inode+0x5d/0x220 [ 1142.032950][T19590] ? alloc_inode+0x5d/0x220 [ 1142.037466][T19590] kmem_cache_alloc_lru+0x12d/0x630 [ 1142.042700][T19590] ? romfs_free_inode+0x20/0x20 [ 1142.047565][T19590] ? alloc_inode+0x5d/0x220 [ 1142.052083][T19590] alloc_inode+0x5d/0x220 20:11:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x700}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xa00}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1142.056434][T19590] iget_locked+0x1b3/0x700 [ 1142.060889][T19590] romfs_iget+0x176/0x750 [ 1142.065275][T19590] ? romfs_readdir+0x550/0x550 [ 1142.070056][T19590] ? romfs_fill_super+0x5cf/0x830 [ 1142.075100][T19590] romfs_fill_super+0x5df/0x830 [ 1142.079963][T19590] get_tree_bdev+0x43e/0x7d0 [ 1142.084570][T19590] ? romfs_get_tree+0x60/0x60 [ 1142.089260][T19590] romfs_get_tree+0x4e/0x60 [ 1142.093773][T19590] vfs_get_tree+0x88/0x350 [ 1142.098213][T19590] path_mount+0x1492/0x1ed0 [ 1142.102773][T19590] ? kmem_cache_free+0xf0/0x490 20:11:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xe00}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1142.107635][T19590] ? finish_automount+0xa50/0xa50 [ 1142.112674][T19590] ? putname+0x101/0x140 [ 1142.116934][T19590] __x64_sys_mount+0x293/0x310 [ 1142.121716][T19590] ? copy_mnt_ns+0xb60/0xb60 [ 1142.126324][T19590] ? syscall_enter_from_user_mode+0x26/0x80 [ 1142.132242][T19590] do_syscall_64+0x38/0xb0 [ 1142.136678][T19590] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1142.142591][T19590] RIP: 0033:0x7ffba087e1ea [ 1142.147022][T19590] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1142.166632][T19590] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1142.175053][T19590] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1142.183038][T19590] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1142.191024][T19590] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1142.198996][T19590] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1142.206978][T19590] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1142.214952][T19590] [ 1142.217456][T12659] usb 5-1: new high-speed USB device number 68 using dummy_hcd [ 1142.354602][T19596] gre340: entered promiscuous mode [ 1142.371924][T19596] team414: Port device gre340 added [ 1142.377585][T19597] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1142.405810][T19597] team403: entered promiscuous mode [ 1142.411490][T19597] 8021q: adding VLAN 0 to HW filter on device team403 [ 1142.426183][T19594] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1142.450514][T19594] team409: entered promiscuous mode [ 1142.457231][T19594] 8021q: adding VLAN 0 to HW filter on device team409 [ 1142.577467][T12659] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1142.588972][T12659] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1142.598990][T12659] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1142.609912][T12659] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1142.619598][T12659] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1142.632509][T12659] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1142.641636][T12659] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1142.651000][T12659] usb 5-1: config 0 descriptor?? 20:11:15 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009310000000122010009058103000000000009050203"], 0x0) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x10, 0x45e, 0x48, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3f, 0x80, 0x80, [{{0x9, 0x4, 0x0, 0x54, 0x1, 0x3, 0x1, 0x3, 0x7f, {0x9, 0x21, 0xe8ce, 0x97, 0x1, {0x22, 0x2c6}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x7, 0x8, 0x9}}}}}]}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x300, 0x4, 0x9, 0x7, 0x8, 0x81}, 0xc, &(0x7f00000000c0)={0x5, 0xf, 0xc, 0x1, [@ext_cap={0x7, 0x10, 0x2, 0x2, 0x6, 0x6, 0xa0}]}, 0x3, [{0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x1401}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x430}}, {0x9d, &(0x7f0000000180)=@string={0x9d, 0x3, "c8d0ad79e18296d88eae211d68fec9d1a707b371463011793dff53e67feb926207bdcd3bd6f4c8606536bea935b878cc90c7b0870ee55de3743bbe05e5c90a462d2226870aa1ff1519dc42083c0f980b9ab059218d29ff20ec916d1178ce4c7f7a08f7310ffe54c3087eb49ef79e8845fc13aeb23b0a3f1c67f37ca38def3899d4ac3755c572f964dcd60c3cafc250aae513b31c6fb6570f4960c1"}}]}) (async) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0x10, 0x45e, 0x48, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3f, 0x80, 0x80, [{{0x9, 0x4, 0x0, 0x54, 0x1, 0x3, 0x1, 0x3, 0x7f, {0x9, 0x21, 0xe8ce, 0x97, 0x1, {0x22, 0x2c6}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x7, 0x8, 0x9}}}}}]}}]}}, &(0x7f0000000240)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x300, 0x4, 0x9, 0x7, 0x8, 0x81}, 0xc, &(0x7f00000000c0)={0x5, 0xf, 0xc, 0x1, [@ext_cap={0x7, 0x10, 0x2, 0x2, 0x6, 0x6, 0xa0}]}, 0x3, [{0x4, &(0x7f0000000100)=@lang_id={0x4, 0x3, 0x1401}}, {0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x430}}, {0x9d, &(0x7f0000000180)=@string={0x9d, 0x3, "c8d0ad79e18296d88eae211d68fec9d1a707b371463011793dff53e67feb926207bdcd3bd6f4c8606536bea935b878cc90c7b0870ee55de3743bbe05e5c90a462d2226870aa1ff1519dc42083c0f980b9ab059218d29ff20ec916d1178ce4c7f7a08f7310ffe54c3087eb49ef79e8845fc13aeb23b0a3f1c67f37ca38def3899d4ac3755c572f964dcd60c3cafc250aae513b31c6fb6570f4960c1"}}]}) syz_usb_control_io$hid(r0, 0x0, 0x0) 20:11:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x1100}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:15 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 92) 20:11:15 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xf0ffffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:15 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0xec0, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:15 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xdb620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1144.850167][T17997] usb 5-1: USB disconnect, device number 68 [ 1144.886020][T19614] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:11:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x1400}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1144.902243][T19617] loop0: detected capacity change from 0 to 24 [ 1144.925852][T19617] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1144.935632][T19617] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1144.940255][T19614] team404: entered promiscuous mode 20:11:15 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x20000, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x1f00}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1144.950191][T19614] 8021q: adding VLAN 0 to HW filter on device team404 [ 1144.953557][T19617] FAULT_INJECTION: forcing a failure. [ 1144.953557][T19617] name failslab, interval 1, probability 0, space 0, times 0 [ 1144.976511][T19625] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1145.013184][T19625] team410: entered promiscuous mode [ 1145.025320][T19625] 8021q: adding VLAN 0 to HW filter on device team410 [ 1145.032503][T19617] CPU: 1 PID: 19617 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1145.042945][T19617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1145.053003][T19617] Call Trace: [ 1145.056272][T19617] 20:11:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x24ab}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1145.059204][T19617] dump_stack_lvl+0x125/0x1b0 [ 1145.063901][T19617] should_fail_ex+0x496/0x5b0 [ 1145.068595][T19617] should_failslab+0x9/0x20 [ 1145.073108][T19617] __kmem_cache_alloc_node+0x2fd/0x350 [ 1145.078593][T19617] ? memcg_list_lru_alloc+0x534/0xa80 [ 1145.083970][T19617] ? memcg_list_lru_alloc+0x534/0xa80 [ 1145.089348][T19617] __kmalloc+0x4c/0x100 [ 1145.093519][T19617] memcg_list_lru_alloc+0x534/0xa80 [ 1145.098739][T19617] ? find_held_lock+0x2d/0x110 [ 1145.103518][T19617] ? memcg_reparent_list_lrus+0x8d0/0x8d0 [ 1145.109244][T19617] ? kmem_cache_alloc_lru+0x107/0x630 [ 1145.114640][T19617] ? alloc_inode+0x5d/0x220 [ 1145.119169][T19617] ? alloc_inode+0x5d/0x220 [ 1145.123677][T19617] kmem_cache_alloc_lru+0x12d/0x630 [ 1145.128892][T19617] ? romfs_free_inode+0x20/0x20 [ 1145.133759][T19617] ? alloc_inode+0x5d/0x220 [ 1145.138264][T19617] alloc_inode+0x5d/0x220 [ 1145.142606][T19617] iget_locked+0x1b3/0x700 [ 1145.147037][T19617] romfs_iget+0x176/0x750 [ 1145.151369][T19617] ? romfs_readdir+0x550/0x550 [ 1145.156152][T19617] ? romfs_fill_super+0x5cf/0x830 [ 1145.160844][T19625] gre337: entered promiscuous mode [ 1145.161188][T19617] romfs_fill_super+0x5df/0x830 [ 1145.161220][T19617] get_tree_bdev+0x43e/0x7d0 [ 1145.161242][T19617] ? romfs_get_tree+0x60/0x60 [ 1145.161261][T19617] romfs_get_tree+0x4e/0x60 [ 1145.161279][T19617] vfs_get_tree+0x88/0x350 [ 1145.161298][T19617] path_mount+0x1492/0x1ed0 [ 1145.161321][T19617] ? kmem_cache_free+0xf0/0x490 [ 1145.161342][T19617] ? finish_automount+0xa50/0xa50 [ 1145.161361][T19617] ? putname+0x101/0x140 [ 1145.161378][T19617] __x64_sys_mount+0x293/0x310 [ 1145.161396][T19617] ? copy_mnt_ns+0xb60/0xb60 [ 1145.161414][T19617] ? syscall_enter_from_user_mode+0x26/0x80 [ 1145.161440][T19617] do_syscall_64+0x38/0xb0 [ 1145.161456][T19617] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1145.161475][T19617] RIP: 0033:0x7ffba087e1ea [ 1145.161489][T19617] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1145.161505][T19617] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1145.212848][T19625] team410: Port device gre337 added [ 1145.215158][T19617] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1145.215180][T19617] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1145.215194][T19617] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1145.215207][T19617] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 20:11:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x2800}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:15 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xdc000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1145.215219][T19617] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1145.215244][T19617] [ 1145.220758][T19624] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1145.388933][T19624] team415: entered promiscuous mode [ 1145.394446][T19624] 8021q: adding VLAN 0 to HW filter on device team415 [ 1145.437129][T19632] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1145.543133][T17997] usb 5-1: new high-speed USB device number 69 using dummy_hcd [ 1145.653204][T19615] gre341: entered promiscuous mode [ 1145.673629][T19615] team415: Port device gre341 added [ 1145.680944][T19639] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1145.703283][T19639] team411: entered promiscuous mode [ 1145.710043][T19639] 8021q: adding VLAN 0 to HW filter on device team411 [ 1145.825780][T19640] gre338: entered promiscuous mode [ 1145.834373][T19640] team411: Port device gre338 added [ 1145.967559][T17997] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1145.978689][T17997] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1145.988872][T17997] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1145.999752][T17997] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1146.009665][T17997] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1146.023114][T17997] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1146.034530][T17997] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1146.043743][T17997] usb 5-1: config 0 descriptor?? 20:11:18 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 93) 20:11:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x3600}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:18 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x33fe0, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:18 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xf1720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:18 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xdc620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:18 executing program 4: r0 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)=ANY=[@ANYRES64, @ANYRESHEX=0x0], 0x0) syz_usb_connect$cdc_ncm(0x2, 0x85, &(0x7f0000000b40)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x73, 0x2, 0x1, 0xb3, 0x0, 0x9, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x7, 0x24, 0x6, 0x0, 0x1, "1392"}, {0x5, 0x24, 0x0, 0xffff}, {0xd, 0x24, 0xf, 0x1, 0x8, 0x2, 0x80, 0x40}, {0x6, 0x24, 0x1a, 0x2, 0x28}, [@mdlm={0x15, 0x24, 0x12, 0x1}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0xd7, 0x7}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x7, 0x5, 0x1f}}, {{0x9, 0x5, 0x3, 0x2, 0x200, 0x2, 0x8, 0xff}}}}}}}]}}, &(0x7f0000000cc0)={0xa, &(0x7f0000000c00)={0xa, 0x6, 0x300, 0x2, 0x0, 0x8, 0x40}, 0xf, &(0x7f0000000c40)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x1, 0x8f, 0x7f, 0x20}]}, 0x1, [{0x4, &(0x7f0000000c80)=@lang_id={0x4, 0x3, 0x810}}]}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000480)={0x24, &(0x7f00000003c0)={0x0, 0xd, 0x47, {0x47, 0x8, "2dccab090e9946820900fabe8671926f8f239a65ba0fb8003b302603bc68995a2160abe746cccb47aa4859a1c812676668a42ec33d2b944b2737af81016cf76045c9d2c754"}}, 0xfffffffffffffffc, &(0x7f0000000200)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x3, "c09c0205"}]}}, &(0x7f0000000440)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0xf0, 0x1, {0x22, 0x18f}}}}, &(0x7f00000006c0)={0x2c, &(0x7f00000004c0)={0x0, 0x0, 0x65, "ed6d5b1323afb8bf9ffa999a6e65d56d9feb57bc05974720db99ba9cbf193bcda753e1eec34b1aa66435d4ae0c20e2af79778f6232cc61b47f4ef56baf8428afd6777326e726949189e9385fa394c9f8a9773a4fb98b45766b5be50433f43f120ba475a0f6"}, &(0x7f0000000540)={0x0, 0xa, 0x1}, &(0x7f0000000580)={0x0, 0x8, 0x1, 0x3e}, &(0x7f00000005c0)={0x20, 0x1, 0x8e, "115141db6a5c9b045f034200203b7982922b70ad2ce93871a144e354eb892a84bd1417516a2bd80d19f67283415a9424b289debd2e671419edf0db4f19c794892d4449c5bd9063a23d82506002bc3935a63a2e4d8f35b040da60dcc6584c0801e11b51634bea9afb2c368df06f926cb703180835d4c65613b21facc6e6d747a49c876886df9c8ba72472e3b518bb"}, &(0x7f0000000680)={0x20, 0x3, 0x1, 0x81}}) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f00000000c0)=ANY=[@ANYBLOB="ddffde0750690147df2d052562c65ca324a933245bc2446040e58a89ef75fdf2b6bccb9592a7bcb3bcb5ac38c5e2f1bdd1d78cf2639e9d713707117d66a2ddfb35fe6ba3f9e10734f697e892e49da3f388cb58a7a2f525ef84a411270ac43f6b15412e710b198f4a0b98457e30f6f4a89573b997f16950f229958897596e2b10236a1fe8f60ddb040d36e289e78b83d174f0ba8efe725d57dd2e00"/169], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r1, 0x82, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000300)={0x2c, &(0x7f0000000040)={0x40, 0x11, 0x65, {0x65, 0xb, "001f5fcc738d68b5a10dd60d3c48b83cc46f79a341a4057e09dbddaa89f14f3558ac623169b694cf23918f27eb161010b085407759b093ec6670ec53d1930a6ae1a3bc1929fdbc13c024ef5048c564f316d17f206fb608f195a1d91483a4a6694941c9"}}, &(0x7f0000000180)={0x0, 0x3, 0x1e, @string={0x1e, 0x3, "373a493b242f21910e578d1ae10c5ecc8276ece7541e1f04dcbbd274"}}, &(0x7f00000001c0)={0x0, 0xf, 0x1a, {0x5, 0xf, 0x1a, 0x2, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x5, 0x1, 0x1}, @wireless={0xb, 0x10, 0x1, 0x2, 0x42, 0x81, 0x2, 0x40, 0x8}]}}, &(0x7f0000000280)={0x20, 0x29, 0xf, {0xf, 0x29, 0x3, 0x2, 0x2, 0x8, "924c91e0", "14522d17"}}, &(0x7f00000002c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x1, 0x1, 0x81, 0x7f, 0x0, 0x7, 0x8000}}}, &(0x7f0000000a80)={0x84, &(0x7f0000000340)={0x0, 0x14, 0x32, "afdfd3edc91b2d3c25d4ac619d80441ef7e1fe8a230ee496cd669b795fedd011b017bc2edc0fc36d38ed04f0dd529947ac3c"}, &(0x7f0000000380)={0x0, 0xa, 0x1}, &(0x7f0000000700)={0x0, 0x8, 0x1}, &(0x7f0000000740)={0x20, 0x0, 0x4, {0x1, 0x3}}, &(0x7f0000000780)={0x20, 0x0, 0x8, {0x1, 0x8, [0xf00]}}, &(0x7f00000007c0)={0x40, 0x7, 0x2, 0x2}, &(0x7f0000000800)={0x40, 0x9, 0x1}, &(0x7f0000000840)={0x40, 0xb, 0x2, "b523"}, &(0x7f0000000880)={0x40, 0xf, 0x2, 0xfeff}, &(0x7f00000008c0)={0x40, 0x13, 0x6, @local}, &(0x7f0000000900)={0x40, 0x17, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x14}}, &(0x7f0000000940)={0x40, 0x19, 0x2, "63a9"}, &(0x7f0000000980)={0x40, 0x1a, 0x2, 0x7}, &(0x7f00000009c0)={0x40, 0x1c, 0x1, 0x20}, &(0x7f0000000a00)={0x40, 0x1e, 0x1, 0xff}, &(0x7f0000000a40)={0x40, 0x21, 0x1, 0xb8}}) [ 1147.913146][T12659] usb 5-1: USB disconnect, device number 69 20:11:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x4000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1147.958173][T19649] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1147.963293][T19652] loop0: detected capacity change from 0 to 24 [ 1147.981155][T19652] FAULT_INJECTION: forcing a failure. [ 1147.981155][T19652] name failslab, interval 1, probability 0, space 0, times 0 20:11:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x6000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1147.998368][T19652] CPU: 1 PID: 19652 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1148.008802][T19652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1148.011699][T19649] team412: entered promiscuous mode [ 1148.018853][T19652] Call Trace: [ 1148.018862][T19652] [ 1148.018870][T19652] dump_stack_lvl+0x125/0x1b0 [ 1148.018899][T19652] should_fail_ex+0x496/0x5b0 [ 1148.018927][T19652] should_failslab+0x9/0x20 [ 1148.031773][T19649] 8021q: adding VLAN 0 to HW filter on device team412 [ 1148.035012][T19652] __kmem_cache_alloc_node+0x2fd/0x350 [ 1148.035073][T19652] ? tomoyo_encode2+0x100/0x3d0 [ 1148.061331][T19652] ? tomoyo_encode2+0x100/0x3d0 [ 1148.066231][T19652] __kmalloc+0x4c/0x100 [ 1148.070406][T19652] tomoyo_encode2+0x100/0x3d0 [ 1148.075178][T19652] ? rcu_is_watching+0x12/0xb0 [ 1148.079955][T19652] tomoyo_encode+0x29/0x50 [ 1148.084380][T19652] tomoyo_realpath_from_path+0x196/0x710 [ 1148.090029][T19652] tomoyo_mount_acl+0x1af/0x880 [ 1148.094895][T19652] ? tomoyo_check_mount_acl+0x1a0/0x1a0 [ 1148.100459][T19652] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1148.106443][T19652] ? __lock_acquire+0x182f/0x5de0 [ 1148.111484][T19652] ? tomoyo_domain+0xbd/0x150 [ 1148.116161][T19652] ? tomoyo_profile+0x47/0x60 [ 1148.120846][T19652] tomoyo_mount_permission+0x16d/0x410 [ 1148.126312][T19652] ? tomoyo_mount_permission+0x10b/0x410 [ 1148.131965][T19652] ? tomoyo_mount_acl+0x880/0x880 [ 1148.136995][T19652] ? kasan_quarantine_put+0x1c3/0x230 [ 1148.142376][T19652] security_sb_mount+0x86/0xd0 [ 1148.147147][T19652] path_mount+0x129/0x1ed0 [ 1148.151564][T19652] ? kmem_cache_free+0xf0/0x490 [ 1148.156419][T19652] ? finish_automount+0xa50/0xa50 [ 1148.161448][T19652] ? putname+0x101/0x140 [ 1148.165687][T19652] __x64_sys_mount+0x293/0x310 [ 1148.170474][T19652] ? copy_mnt_ns+0xb60/0xb60 [ 1148.175074][T19652] ? syscall_enter_from_user_mode+0x26/0x80 [ 1148.180979][T19652] do_syscall_64+0x38/0xb0 [ 1148.185395][T19652] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1148.191291][T19652] RIP: 0033:0x7ffba087e1ea [ 1148.195702][T19652] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1148.215311][T19652] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1148.223764][T19652] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1148.231765][T19652] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1148.239740][T19652] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1148.247707][T19652] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1148.255670][T19652] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1148.263652][T19652] [ 1148.269891][T19651] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1148.296260][T19651] team405: entered promiscuous mode [ 1148.297444][T19652] ERROR: Out of memory at tomoyo_realpath_from_path. 20:11:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xab24}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:18 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40000, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1148.302652][T19651] 8021q: adding VLAN 0 to HW filter on device team405 20:11:18 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 94) 20:11:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xe000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1148.451770][T19668] loop0: detected capacity change from 0 to 24 [ 1148.467390][T19668] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1148.479676][T19668] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1148.489087][T19668] FAULT_INJECTION: forcing a failure. [ 1148.489087][T19668] name failslab, interval 1, probability 0, space 0, times 0 [ 1148.503663][T19668] CPU: 1 PID: 19668 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1148.514081][T19668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1148.524140][T19668] Call Trace: [ 1148.527416][T19668] [ 1148.530375][T19668] dump_stack_lvl+0x125/0x1b0 [ 1148.535150][T19668] should_fail_ex+0x496/0x5b0 [ 1148.539837][T19668] should_failslab+0x9/0x20 [ 1148.544360][T19668] __kmem_cache_alloc_node+0x2fd/0x350 [ 1148.549825][T19668] ? memcg_list_lru_alloc+0x249/0xa80 [ 1148.555200][T19668] ? memcg_list_lru_alloc+0x249/0xa80 [ 1148.560570][T19668] __kmalloc+0x4c/0x100 [ 1148.564726][T19668] ? __d_alloc+0x32/0xac0 [ 1148.569059][T19668] memcg_list_lru_alloc+0x249/0xa80 [ 1148.574250][T19668] ? find_held_lock+0x2d/0x110 [ 1148.579012][T19668] ? memcg_reparent_list_lrus+0x8d0/0x8d0 [ 1148.584725][T19668] ? kmem_cache_alloc_lru+0x107/0x630 [ 1148.590098][T19668] ? __d_alloc+0x32/0xac0 [ 1148.594433][T19668] ? __d_alloc+0x32/0xac0 [ 1148.598762][T19668] kmem_cache_alloc_lru+0x12d/0x630 [ 1148.603983][T19668] ? do_raw_spin_unlock+0x173/0x230 [ 1148.609189][T19668] ? __d_alloc+0x32/0xac0 [ 1148.613520][T19668] __d_alloc+0x32/0xac0 [ 1148.617682][T19668] d_make_root+0x48/0xf0 [ 1148.621926][T19668] romfs_fill_super+0x60b/0x830 [ 1148.626771][T19668] get_tree_bdev+0x43e/0x7d0 [ 1148.631359][T19668] ? romfs_get_tree+0x60/0x60 [ 1148.636033][T19668] romfs_get_tree+0x4e/0x60 [ 1148.640527][T19668] vfs_get_tree+0x88/0x350 [ 1148.644934][T19668] path_mount+0x1492/0x1ed0 [ 1148.649432][T19668] ? kmem_cache_free+0xf0/0x490 [ 1148.654275][T19668] ? finish_automount+0xa50/0xa50 [ 1148.659296][T19668] ? putname+0x101/0x140 [ 1148.663531][T19668] __x64_sys_mount+0x293/0x310 [ 1148.668290][T19668] ? copy_mnt_ns+0xb60/0xb60 [ 1148.672874][T19668] ? syscall_enter_from_user_mode+0x26/0x80 [ 1148.678769][T19668] do_syscall_64+0x38/0xb0 [ 1148.683179][T19668] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1148.689065][T19668] RIP: 0033:0x7ffba087e1ea [ 1148.693471][T19668] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1148.713079][T19668] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1148.721514][T19668] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1148.729496][T19668] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1148.737464][T19668] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1148.745464][T19668] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1148.753435][T19668] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1148.761442][T19668] [ 1148.770537][T19655] gre339: entered promiscuous mode [ 1148.795647][T19655] team412: Port device gre339 added [ 1148.801577][T19659] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1148.849986][T19659] team416: entered promiscuous mode [ 1148.857528][T12659] usb 5-1: new high-speed USB device number 70 using dummy_hcd [ 1148.869132][T19659] 8021q: adding VLAN 0 to HW filter on device team416 [ 1148.960618][T19650] gre342: entered promiscuous mode [ 1148.969644][T19650] team416: Port device gre342 added [ 1148.975518][T19665] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1148.999174][T19665] team406: entered promiscuous mode [ 1149.004660][T19665] 8021q: adding VLAN 0 to HW filter on device team406 [ 1149.052221][T12659] usb 5-1: device descriptor read/64, error 18 [ 1149.347406][T12659] usb 5-1: new high-speed USB device number 71 using dummy_hcd [ 1149.577410][T12659] usb 5-1: device descriptor read/64, error 18 [ 1149.708689][T12659] usb usb5-port1: attempt power cycle [ 1150.127472][T12659] usb 5-1: new high-speed USB device number 72 using dummy_hcd [ 1150.300394][T12659] usb 5-1: device descriptor read/8, error -61 [ 1150.567489][T12659] usb 5-1: new high-speed USB device number 73 using dummy_hcd [ 1150.737492][T12659] usb 5-1: device descriptor read/8, error -61 [ 1150.857780][T12659] usb usb5-port1: unable to enumerate USB device 20:11:21 executing program 4: syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)=ANY=[@ANYRES64, @ANYRESHEX=0x0], 0x0) (async) r0 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)=ANY=[@ANYRES64, @ANYRESHEX=0x0], 0x0) syz_usb_connect$cdc_ncm(0x2, 0x85, &(0x7f0000000b40)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x73, 0x2, 0x1, 0xb3, 0x0, 0x9, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x7, 0x24, 0x6, 0x0, 0x1, "1392"}, {0x5, 0x24, 0x0, 0xffff}, {0xd, 0x24, 0xf, 0x1, 0x8, 0x2, 0x80, 0x40}, {0x6, 0x24, 0x1a, 0x2, 0x28}, [@mdlm={0x15, 0x24, 0x12, 0x1}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0xd7, 0x7}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x7, 0x5, 0x1f}}, {{0x9, 0x5, 0x3, 0x2, 0x200, 0x2, 0x8, 0xff}}}}}}}]}}, &(0x7f0000000cc0)={0xa, &(0x7f0000000c00)={0xa, 0x6, 0x300, 0x2, 0x0, 0x8, 0x40}, 0xf, &(0x7f0000000c40)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x1, 0x8f, 0x7f, 0x20}]}, 0x1, [{0x4, &(0x7f0000000c80)=@lang_id={0x4, 0x3, 0x810}}]}) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000480)={0x24, &(0x7f00000003c0)={0x0, 0xd, 0x47, {0x47, 0x8, "2dccab090e9946820900fabe8671926f8f239a65ba0fb8003b302603bc68995a2160abe746cccb47aa4859a1c812676668a42ec33d2b944b2737af81016cf76045c9d2c754"}}, 0xfffffffffffffffc, &(0x7f0000000200)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x3, "c09c0205"}]}}, &(0x7f0000000440)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0xf0, 0x1, {0x22, 0x18f}}}}, &(0x7f00000006c0)={0x2c, &(0x7f00000004c0)={0x0, 0x0, 0x65, "ed6d5b1323afb8bf9ffa999a6e65d56d9feb57bc05974720db99ba9cbf193bcda753e1eec34b1aa66435d4ae0c20e2af79778f6232cc61b47f4ef56baf8428afd6777326e726949189e9385fa394c9f8a9773a4fb98b45766b5be50433f43f120ba475a0f6"}, &(0x7f0000000540)={0x0, 0xa, 0x1}, &(0x7f0000000580)={0x0, 0x8, 0x1, 0x3e}, &(0x7f00000005c0)={0x20, 0x1, 0x8e, "115141db6a5c9b045f034200203b7982922b70ad2ce93871a144e354eb892a84bd1417516a2bd80d19f67283415a9424b289debd2e671419edf0db4f19c794892d4449c5bd9063a23d82506002bc3935a63a2e4d8f35b040da60dcc6584c0801e11b51634bea9afb2c368df06f926cb703180835d4c65613b21facc6e6d747a49c876886df9c8ba72472e3b518bb"}, &(0x7f0000000680)={0x20, 0x3, 0x1, 0x81}}) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f00000000c0)=ANY=[@ANYBLOB="ddffde0750690147df2d052562c65ca324a933245bc2446040e58a89ef75fdf2b6bccb9592a7bcb3bcb5ac38c5e2f1bdd1d78cf2639e9d713707117d66a2ddfb35fe6ba3f9e10734f697e892e49da3f388cb58a7a2f525ef84a411270ac43f6b15412e710b198f4a0b98457e30f6f4a89573b997f16950f229958897596e2b10236a1fe8f60ddb040d36e289e78b83d174f0ba8efe725d57dd2e00"/169], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r1, 0x82, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000300)={0x2c, &(0x7f0000000040)={0x40, 0x11, 0x65, {0x65, 0xb, "001f5fcc738d68b5a10dd60d3c48b83cc46f79a341a4057e09dbddaa89f14f3558ac623169b694cf23918f27eb161010b085407759b093ec6670ec53d1930a6ae1a3bc1929fdbc13c024ef5048c564f316d17f206fb608f195a1d91483a4a6694941c9"}}, &(0x7f0000000180)={0x0, 0x3, 0x1e, @string={0x1e, 0x3, "373a493b242f21910e578d1ae10c5ecc8276ece7541e1f04dcbbd274"}}, &(0x7f00000001c0)={0x0, 0xf, 0x1a, {0x5, 0xf, 0x1a, 0x2, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x5, 0x1, 0x1}, @wireless={0xb, 0x10, 0x1, 0x2, 0x42, 0x81, 0x2, 0x40, 0x8}]}}, &(0x7f0000000280)={0x20, 0x29, 0xf, {0xf, 0x29, 0x3, 0x2, 0x2, 0x8, "924c91e0", "14522d17"}}, &(0x7f00000002c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x1, 0x1, 0x81, 0x7f, 0x0, 0x7, 0x8000}}}, &(0x7f0000000a80)={0x84, &(0x7f0000000340)={0x0, 0x14, 0x32, "afdfd3edc91b2d3c25d4ac619d80441ef7e1fe8a230ee496cd669b795fedd011b017bc2edc0fc36d38ed04f0dd529947ac3c"}, &(0x7f0000000380)={0x0, 0xa, 0x1}, &(0x7f0000000700)={0x0, 0x8, 0x1}, &(0x7f0000000740)={0x20, 0x0, 0x4, {0x1, 0x3}}, &(0x7f0000000780)={0x20, 0x0, 0x8, {0x1, 0x8, [0xf00]}}, &(0x7f00000007c0)={0x40, 0x7, 0x2, 0x2}, &(0x7f0000000800)={0x40, 0x9, 0x1}, &(0x7f0000000840)={0x40, 0xb, 0x2, "b523"}, &(0x7f0000000880)={0x40, 0xf, 0x2, 0xfeff}, &(0x7f00000008c0)={0x40, 0x13, 0x6, @local}, &(0x7f0000000900)={0x40, 0x17, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x14}}, &(0x7f0000000940)={0x40, 0x19, 0x2, "63a9"}, &(0x7f0000000980)={0x40, 0x1a, 0x2, 0x7}, &(0x7f00000009c0)={0x40, 0x1c, 0x1, 0x20}, &(0x7f0000000a00)={0x40, 0x1e, 0x1, 0xff}, &(0x7f0000000a40)={0x40, 0x21, 0x1, 0xb8}}) 20:11:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xe5ff}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:21 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xdd620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:21 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 95) 20:11:21 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xf2720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:21 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x2, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xe803}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1150.981797][T19675] loop0: detected capacity change from 0 to 24 [ 1150.992501][T19679] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1151.015614][T19675] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1151.034635][T19683] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1151.036897][T19679] team417: entered promiscuous mode [ 1151.045288][T19683] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1151.055668][T19679] 8021q: adding VLAN 0 to HW filter on device team417 [ 1151.056248][T19675] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:11:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xf401}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1151.082658][T19683] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1151.095507][T19675] FAULT_INJECTION: forcing a failure. [ 1151.095507][T19675] name failslab, interval 1, probability 0, space 0, times 0 [ 1151.121814][T19683] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1151.134539][T19675] CPU: 0 PID: 19675 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1151.145011][T19675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1151.155086][T19675] Call Trace: [ 1151.158370][T19675] [ 1151.161314][T19675] dump_stack_lvl+0x125/0x1b0 [ 1151.166026][T19675] should_fail_ex+0x496/0x5b0 [ 1151.170727][T19675] should_failslab+0x9/0x20 [ 1151.175245][T19675] __kmem_cache_alloc_node+0x2fd/0x350 [ 1151.180767][T19675] ? memcg_list_lru_alloc+0x249/0xa80 [ 1151.186158][T19675] ? memcg_list_lru_alloc+0x249/0xa80 [ 1151.191556][T19675] __kmalloc+0x4c/0x100 [ 1151.195744][T19675] ? __d_alloc+0x32/0xac0 [ 1151.200114][T19675] memcg_list_lru_alloc+0x249/0xa80 [ 1151.205347][T19675] ? find_held_lock+0x2d/0x110 [ 1151.210173][T19675] ? memcg_reparent_list_lrus+0x8d0/0x8d0 [ 1151.215923][T19675] ? kmem_cache_alloc_lru+0x107/0x630 [ 1151.221336][T19675] ? __d_alloc+0x32/0xac0 [ 1151.225701][T19675] ? __d_alloc+0x32/0xac0 [ 1151.230074][T19675] kmem_cache_alloc_lru+0x12d/0x630 [ 1151.235300][T19675] ? do_raw_spin_unlock+0x173/0x230 [ 1151.240526][T19675] ? __d_alloc+0x32/0xac0 [ 1151.244867][T19675] __d_alloc+0x32/0xac0 [ 1151.249036][T19675] d_make_root+0x48/0xf0 [ 1151.253290][T19675] romfs_fill_super+0x60b/0x830 [ 1151.258145][T19675] get_tree_bdev+0x43e/0x7d0 [ 1151.262735][T19675] ? romfs_get_tree+0x60/0x60 [ 1151.267406][T19675] romfs_get_tree+0x4e/0x60 [ 1151.271947][T19675] vfs_get_tree+0x88/0x350 [ 1151.276358][T19675] path_mount+0x1492/0x1ed0 [ 1151.280863][T19675] ? kmem_cache_free+0xf0/0x490 [ 1151.285718][T19675] ? finish_automount+0xa50/0xa50 [ 1151.290748][T19675] ? putname+0x101/0x140 [ 1151.294993][T19675] __x64_sys_mount+0x293/0x310 [ 1151.299780][T19675] ? copy_mnt_ns+0xb60/0xb60 [ 1151.304368][T19675] ? syscall_enter_from_user_mode+0x26/0x80 [ 1151.310265][T19675] do_syscall_64+0x38/0xb0 [ 1151.314677][T19675] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1151.320569][T19675] RIP: 0033:0x7ffba087e1ea [ 1151.324983][T19675] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1151.344598][T19675] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1151.353013][T19675] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1151.360982][T19675] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1151.369039][T19675] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1151.377006][T19675] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 20:11:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xffe5}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x1000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1151.384976][T19675] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1151.392960][T19675] [ 1151.397657][T19683] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1151.406261][T19683] misc raw-gadget: fail, usb_gadget_register_driver returned -16 20:11:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x2000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:21 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 96) [ 1151.484788][T19685] gre343: entered promiscuous mode [ 1151.504066][T19685] team417: Port device gre343 added [ 1151.514624][T19686] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1151.588016][T19699] loop0: detected capacity change from 0 to 24 [ 1151.588482][T19686] team413: entered promiscuous mode [ 1151.596041][T19686] 8021q: adding VLAN 0 to HW filter on device team413 [ 1151.606058][T19699] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1151.614617][T19699] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1151.617777][T17997] usb 5-1: new high-speed USB device number 74 using dummy_hcd [ 1151.633232][T19699] FAULT_INJECTION: forcing a failure. [ 1151.633232][T19699] name failslab, interval 1, probability 0, space 0, times 0 [ 1151.646368][T19688] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1151.647657][T19699] CPU: 1 PID: 19699 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1151.666028][T19699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1151.676091][T19699] Call Trace: [ 1151.679374][T19699] [ 1151.682301][T19699] dump_stack_lvl+0x125/0x1b0 [ 1151.686977][T19699] should_fail_ex+0x496/0x5b0 [ 1151.691671][T19699] should_failslab+0x9/0x20 [ 1151.696180][T19699] __kmem_cache_alloc_node+0x2fd/0x350 [ 1151.701651][T19699] ? memcg_list_lru_alloc+0x534/0xa80 [ 1151.707119][T19699] ? memcg_list_lru_alloc+0x534/0xa80 [ 1151.712526][T19699] __kmalloc+0x4c/0x100 [ 1151.716695][T19699] memcg_list_lru_alloc+0x534/0xa80 [ 1151.721902][T19699] ? find_held_lock+0x2d/0x110 [ 1151.726673][T19699] ? memcg_reparent_list_lrus+0x8d0/0x8d0 [ 1151.732403][T19699] ? kmem_cache_alloc_lru+0x107/0x630 [ 1151.737791][T19699] ? __d_alloc+0x32/0xac0 [ 1151.742132][T19699] ? __d_alloc+0x32/0xac0 [ 1151.746460][T19699] kmem_cache_alloc_lru+0x12d/0x630 [ 1151.751664][T19699] ? do_raw_spin_unlock+0x173/0x230 [ 1151.756960][T19699] ? __d_alloc+0x32/0xac0 [ 1151.761296][T19699] __d_alloc+0x32/0xac0 [ 1151.765457][T19699] d_make_root+0x48/0xf0 [ 1151.769705][T19699] romfs_fill_super+0x60b/0x830 [ 1151.774549][T19699] get_tree_bdev+0x43e/0x7d0 [ 1151.779138][T19699] ? romfs_get_tree+0x60/0x60 [ 1151.783810][T19699] romfs_get_tree+0x4e/0x60 [ 1151.788308][T19699] vfs_get_tree+0x88/0x350 [ 1151.792715][T19699] path_mount+0x1492/0x1ed0 [ 1151.797213][T19699] ? kmem_cache_free+0xf0/0x490 [ 1151.802070][T19699] ? finish_automount+0xa50/0xa50 [ 1151.807096][T19699] ? putname+0x101/0x140 [ 1151.811339][T19699] __x64_sys_mount+0x293/0x310 [ 1151.816104][T19699] ? copy_mnt_ns+0xb60/0xb60 [ 1151.820694][T19699] ? syscall_enter_from_user_mode+0x26/0x80 [ 1151.826591][T19699] do_syscall_64+0x38/0xb0 [ 1151.831010][T19699] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1151.836900][T19699] RIP: 0033:0x7ffba087e1ea [ 1151.841319][T19699] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1151.860938][T19699] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1151.869348][T19699] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1151.877315][T19699] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1151.885291][T19699] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1151.893261][T19699] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1151.901325][T19699] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1151.909321][T19699] [ 1151.929599][T19688] team407: entered promiscuous mode [ 1151.935101][T19688] 8021q: adding VLAN 0 to HW filter on device team407 [ 1152.084620][T19678] gre340: entered promiscuous mode [ 1152.093603][T19678] team413: Port device gre340 added [ 1152.267520][T17997] usb 5-1: config index 0 descriptor too short (expected 72, got 45) [ 1152.275722][T17997] usb 5-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 6 [ 1152.477573][T17997] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 1152.486648][T17997] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1152.497797][T17997] usb 5-1: Product: syz [ 1152.501997][T17997] usb 5-1: Manufacturer: syz [ 1152.506580][T17997] usb 5-1: SerialNumber: syz [ 1152.548039][T17997] usb 5-1: ath9k_htc: Device endpoint numbers are not the expected ones [ 1152.751676][T17997] usb 5-1: USB disconnect, device number 74 20:11:23 executing program 4: r0 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000000)=ANY=[@ANYRES64, @ANYRESHEX=0x0], 0x0) (async) syz_usb_connect$cdc_ncm(0x2, 0x85, &(0x7f0000000b40)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x73, 0x2, 0x1, 0xb3, 0x0, 0x9, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x7, 0x24, 0x6, 0x0, 0x1, "1392"}, {0x5, 0x24, 0x0, 0xffff}, {0xd, 0x24, 0xf, 0x1, 0x8, 0x2, 0x80, 0x40}, {0x6, 0x24, 0x1a, 0x2, 0x28}, [@mdlm={0x15, 0x24, 0x12, 0x1}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0xd7, 0x7}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x7, 0x5, 0x1f}}, {{0x9, 0x5, 0x3, 0x2, 0x200, 0x2, 0x8, 0xff}}}}}}}]}}, &(0x7f0000000cc0)={0xa, &(0x7f0000000c00)={0xa, 0x6, 0x300, 0x2, 0x0, 0x8, 0x40}, 0xf, &(0x7f0000000c40)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x1, 0x8f, 0x7f, 0x20}]}, 0x1, [{0x4, &(0x7f0000000c80)=@lang_id={0x4, 0x3, 0x810}}]}) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000480)={0x24, &(0x7f00000003c0)={0x0, 0xd, 0x47, {0x47, 0x8, "2dccab090e9946820900fabe8671926f8f239a65ba0fb8003b302603bc68995a2160abe746cccb47aa4859a1c812676668a42ec33d2b944b2737af81016cf76045c9d2c754"}}, 0xfffffffffffffffc, &(0x7f0000000200)={0x0, 0x22, 0x5, {[@global=@item_4={0x3, 0x1, 0x3, "c09c0205"}]}}, &(0x7f0000000440)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0xf0, 0x1, {0x22, 0x18f}}}}, &(0x7f00000006c0)={0x2c, &(0x7f00000004c0)={0x0, 0x0, 0x65, "ed6d5b1323afb8bf9ffa999a6e65d56d9feb57bc05974720db99ba9cbf193bcda753e1eec34b1aa66435d4ae0c20e2af79778f6232cc61b47f4ef56baf8428afd6777326e726949189e9385fa394c9f8a9773a4fb98b45766b5be50433f43f120ba475a0f6"}, &(0x7f0000000540)={0x0, 0xa, 0x1}, &(0x7f0000000580)={0x0, 0x8, 0x1, 0x3e}, &(0x7f00000005c0)={0x20, 0x1, 0x8e, "115141db6a5c9b045f034200203b7982922b70ad2ce93871a144e354eb892a84bd1417516a2bd80d19f67283415a9424b289debd2e671419edf0db4f19c794892d4449c5bd9063a23d82506002bc3935a63a2e4d8f35b040da60dcc6584c0801e11b51634bea9afb2c368df06f926cb703180835d4c65613b21facc6e6d747a49c876886df9c8ba72472e3b518bb"}, &(0x7f0000000680)={0x20, 0x3, 0x1, 0x81}}) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f00000000c0)=ANY=[@ANYBLOB="ddffde0750690147df2d052562c65ca324a933245bc2446040e58a89ef75fdf2b6bccb9592a7bcb3bcb5ac38c5e2f1bdd1d78cf2639e9d713707117d66a2ddfb35fe6ba3f9e10734f697e892e49da3f388cb58a7a2f525ef84a411270ac43f6b15412e710b198f4a0b98457e30f6f4a89573b997f16950f229958897596e2b10236a1fe8f60ddb040d36e289e78b83d174f0ba8efe725d57dd2e00"/169], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r1, 0x82, 0x0, 0x0) (async) syz_usb_control_io(r1, &(0x7f0000000300)={0x2c, &(0x7f0000000040)={0x40, 0x11, 0x65, {0x65, 0xb, "001f5fcc738d68b5a10dd60d3c48b83cc46f79a341a4057e09dbddaa89f14f3558ac623169b694cf23918f27eb161010b085407759b093ec6670ec53d1930a6ae1a3bc1929fdbc13c024ef5048c564f316d17f206fb608f195a1d91483a4a6694941c9"}}, &(0x7f0000000180)={0x0, 0x3, 0x1e, @string={0x1e, 0x3, "373a493b242f21910e578d1ae10c5ecc8276ece7541e1f04dcbbd274"}}, &(0x7f00000001c0)={0x0, 0xf, 0x1a, {0x5, 0xf, 0x1a, 0x2, [@ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x5, 0x1, 0x1}, @wireless={0xb, 0x10, 0x1, 0x2, 0x42, 0x81, 0x2, 0x40, 0x8}]}}, &(0x7f0000000280)={0x20, 0x29, 0xf, {0xf, 0x29, 0x3, 0x2, 0x2, 0x8, "924c91e0", "14522d17"}}, &(0x7f00000002c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x1, 0x1, 0x81, 0x7f, 0x0, 0x7, 0x8000}}}, &(0x7f0000000a80)={0x84, &(0x7f0000000340)={0x0, 0x14, 0x32, "afdfd3edc91b2d3c25d4ac619d80441ef7e1fe8a230ee496cd669b795fedd011b017bc2edc0fc36d38ed04f0dd529947ac3c"}, &(0x7f0000000380)={0x0, 0xa, 0x1}, &(0x7f0000000700)={0x0, 0x8, 0x1}, &(0x7f0000000740)={0x20, 0x0, 0x4, {0x1, 0x3}}, &(0x7f0000000780)={0x20, 0x0, 0x8, {0x1, 0x8, [0xf00]}}, &(0x7f00000007c0)={0x40, 0x7, 0x2, 0x2}, &(0x7f0000000800)={0x40, 0x9, 0x1}, &(0x7f0000000840)={0x40, 0xb, 0x2, "b523"}, &(0x7f0000000880)={0x40, 0xf, 0x2, 0xfeff}, &(0x7f00000008c0)={0x40, 0x13, 0x6, @local}, &(0x7f0000000900)={0x40, 0x17, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x14}}, &(0x7f0000000940)={0x40, 0x19, 0x2, "63a9"}, &(0x7f0000000980)={0x40, 0x1a, 0x2, 0x7}, &(0x7f00000009c0)={0x40, 0x1c, 0x1, 0x20}, &(0x7f0000000a00)={0x40, 0x1e, 0x1, 0xff}, &(0x7f0000000a40)={0x40, 0x21, 0x1, 0xb8}}) 20:11:23 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xf3720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x3000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:23 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x3, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:23 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 97) 20:11:23 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xde620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x4000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1153.279772][T19705] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1153.291238][T19708] loop0: detected capacity change from 0 to 24 [ 1153.302748][T19708] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1153.310665][T19705] team414: entered promiscuous mode [ 1153.315677][T19712] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1153.333698][T19708] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1153.337693][T19705] 8021q: adding VLAN 0 to HW filter on device team414 [ 1153.347939][T19712] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1153.358268][T19708] FAULT_INJECTION: forcing a failure. [ 1153.358268][T19708] name failslab, interval 1, probability 0, space 0, times 0 [ 1153.371909][T19714] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:11:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x5000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1153.393219][T19712] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1153.409463][T19714] team418: entered promiscuous mode [ 1153.414889][T19714] 8021q: adding VLAN 0 to HW filter on device team418 [ 1153.422222][T19708] CPU: 1 PID: 19708 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1153.432681][T19708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 20:11:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x6000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x600f9ff}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1153.442763][T19708] Call Trace: [ 1153.446071][T19708] [ 1153.449018][T19708] dump_stack_lvl+0x125/0x1b0 [ 1153.453735][T19708] should_fail_ex+0x496/0x5b0 [ 1153.458453][T19708] ? __d_alloc+0x32/0xac0 [ 1153.462828][T19708] should_failslab+0x9/0x20 [ 1153.467375][T19708] kmem_cache_alloc_lru+0x3e6/0x630 [ 1153.472712][T19708] ? do_raw_spin_unlock+0x173/0x230 [ 1153.477967][T19708] ? __d_alloc+0x32/0xac0 [ 1153.482334][T19708] __d_alloc+0x32/0xac0 [ 1153.486541][T19708] d_make_root+0x48/0xf0 20:11:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x7000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1153.490813][T19708] romfs_fill_super+0x60b/0x830 [ 1153.495681][T19708] get_tree_bdev+0x43e/0x7d0 [ 1153.500307][T19708] ? romfs_get_tree+0x60/0x60 [ 1153.505014][T19708] romfs_get_tree+0x4e/0x60 [ 1153.509545][T19708] vfs_get_tree+0x88/0x350 [ 1153.513997][T19708] path_mount+0x1492/0x1ed0 [ 1153.518538][T19708] ? kmem_cache_free+0xf0/0x490 [ 1153.523442][T19708] ? finish_automount+0xa50/0xa50 [ 1153.528504][T19708] ? putname+0x101/0x140 [ 1153.532434][T19712] misc raw-gadget: fail, usb_gadget_register_driver returned -16 20:11:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x8000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1153.532756][T19708] __x64_sys_mount+0x293/0x310 [ 1153.545245][T19708] ? copy_mnt_ns+0xb60/0xb60 [ 1153.549880][T19708] ? syscall_enter_from_user_mode+0x26/0x80 [ 1153.555828][T19708] do_syscall_64+0x38/0xb0 [ 1153.560280][T19708] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1153.566206][T19708] RIP: 0033:0x7ffba087e1ea [ 1153.570641][T19708] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1153.590362][T19708] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1153.598819][T19708] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1153.606821][T19708] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1153.614816][T19708] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1153.623107][T19708] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1153.631080][T19708] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1153.639083][T19708] [ 1153.665075][T19715] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1153.685856][T19715] team408: entered promiscuous mode [ 1153.691392][T19715] 8021q: adding VLAN 0 to HW filter on device team408 [ 1153.787437][T17997] usb 5-1: new high-speed USB device number 75 using dummy_hcd [ 1153.864593][T19705] gre341: entered promiscuous mode [ 1153.884349][T19705] team414: Port device gre341 added [ 1154.032512][T19709] gre344: entered promiscuous mode [ 1154.041611][T19709] team418: Port device gre344 added [ 1154.147507][T17997] usb 5-1: config index 0 descriptor too short (expected 72, got 45) [ 1154.156491][T17997] usb 5-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 6 [ 1154.327577][T17997] usb 5-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 1154.338962][T17997] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1154.346984][T17997] usb 5-1: Product: syz [ 1154.351960][T17997] usb 5-1: Manufacturer: syz [ 1154.356597][T17997] usb 5-1: SerialNumber: syz [ 1154.400569][T17997] usb 5-1: ath9k_htc: Device endpoint numbers are not the expected ones [ 1154.602874][T15110] usb 5-1: USB disconnect, device number 75 20:11:25 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f0000000140)={0x14, &(0x7f00000000c0)={0x0, 0x1, 0x45, {0x45, 0x23, "07766bc76103a6cd52cad134923e770c0f0f6a4a49af36293404bdb3e9ab02dfc4332b4ca384fb2abbe7deaff9ef862ef0a226d8fbcb22b18ff9205ac5abdae275f535"}}, &(0x7f0000000040)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42a}}}, 0xfffffffffffffffe) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f00000001c0)={0x14, &(0x7f0000000280)={0x40, 0x0, 0xc3, {0xc3, 0x1, "aea8dadb1a4bba2bc6fa0342e2135bb353f83e5db16ab3e510ee605c3ac9260e246f44c77201529342805f6550049497e2a3a534243faa6bc77fbe72eb2c1435b4b178d09cdadf619952fbc9b6c50a4469e46c422d521b76726888a65e70dbd71103349b8b02ecf5a80deb66fdec06b2260f4296ec692f87c6c8d48d7913e4a14d30380ccedf25e33fc68357ff40f2cc63f4a42fad0d2d6a4cfb7c362c04cda321638d3009c32276a0246751d0c5acd704514f6c7f441be7ef9c22fe3881a61812"}}, &(0x7f0000000180)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x44a}}}, &(0x7f00000005c0)={0x44, &(0x7f0000000380)={0x0, 0x15, 0x87, "2723cd0d44fdf8a2eb6986487e30b703da6f151350d22a421e6f37d9bf25523323c620cc32f587ae5822267b8371c587425c7a309c9a46fa3acf0fe01e7769a2c904f9da4389c127b05ea1c3871cdd18f10ccb57ee1d95a115477aaea5d36dee738edbbd92ce1a8f9b9b761ea7c56faa95b6983d5f6d9d79eb47df3c1bd9362902cbf6a5b5fc61"}, &(0x7f0000000200)={0x0, 0xa, 0x1, 0x1}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0xa9}, &(0x7f0000000480)={0x20, 0x81, 0x2, "b54d"}, &(0x7f00000004c0)={0x20, 0x82, 0x1, '1'}, &(0x7f0000000500)={0x20, 0x83, 0x3, "a1c11f"}, &(0x7f0000000540)={0x20, 0x84, 0x4, "6c2e9163"}, &(0x7f0000000580)={0x20, 0x85, 0x3, "fda106"}}) 20:11:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xa000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:25 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 98) 20:11:25 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x4, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:25 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xdf620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:25 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xf4720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xe000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1155.125038][T19734] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1155.136371][T19736] loop0: detected capacity change from 0 to 24 [ 1155.156965][T19734] team415: entered promiscuous mode 20:11:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x11000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:25 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 99) [ 1155.172294][T19734] 8021q: adding VLAN 0 to HW filter on device team415 [ 1155.179812][T19736] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1155.189416][T19736] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:11:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x14000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:25 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") (fail_nth: 100) [ 1155.293111][T19749] loop0: detected capacity change from 0 to 24 [ 1155.303436][T19749] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1155.315881][T19749] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:11:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x1f000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1155.417498][T15110] usb 5-1: new high-speed USB device number 76 using dummy_hcd [ 1155.424091][T19753] loop0: detected capacity change from 0 to 24 [ 1155.461179][T19741] gre342: entered promiscuous mode [ 1155.469113][T19753] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1155.477104][T19753] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1155.499325][T19753] FAULT_INJECTION: forcing a failure. [ 1155.499325][T19753] name failslab, interval 1, probability 0, space 0, times 0 [ 1155.514356][T19741] team415: Port device gre342 added [ 1155.517324][T19753] CPU: 0 PID: 19753 Comm: syz-executor.0 Not tainted 6.5.0-rc7-syzkaller-00104-g4f9e7fabf864 #0 [ 1155.520229][T19743] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1155.529943][T19753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 1155.529963][T19753] Call Trace: [ 1155.529970][T19753] [ 1155.529978][T19753] dump_stack_lvl+0x125/0x1b0 [ 1155.530009][T19753] should_fail_ex+0x496/0x5b0 [ 1155.530043][T19753] should_failslab+0x9/0x20 [ 1155.530074][T19753] __kmem_cache_alloc_node+0x2fd/0x350 [ 1155.530103][T19753] ? get_mountpoint+0x139/0x410 [ 1155.530141][T19753] kmalloc_trace+0x25/0xe0 [ 1155.530171][T19753] get_mountpoint+0x139/0x410 [ 1155.549614][T19743] team419: entered promiscuous mode [ 1155.552657][T19753] attach_recursive_mnt+0x15b/0x11c0 [ 1155.555876][T19743] 8021q: adding VLAN 0 to HW filter on device team419 [ 1155.560276][T19753] ? do_raw_spin_lock+0x12e/0x2b0 [ 1155.560310][T19753] ? count_mounts+0x210/0x210 [ 1155.560329][T19753] ? spin_bug+0x1d0/0x1d0 [ 1155.560360][T19753] graft_tree+0x189/0x210 [ 1155.575048][T19745] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1155.579803][T19753] do_add_mount+0x1cb/0x320 [ 1155.579835][T19753] path_mount+0x1a1d/0x1ed0 [ 1155.579856][T19753] ? kmem_cache_free+0xf0/0x490 [ 1155.579880][T19753] ? finish_automount+0xa50/0xa50 [ 1155.579904][T19753] ? putname+0x101/0x140 [ 1155.579928][T19753] __x64_sys_mount+0x293/0x310 [ 1155.598856][T19745] team409: entered promiscuous mode [ 1155.599430][T19753] ? copy_mnt_ns+0xb60/0xb60 [ 1155.599462][T19753] ? syscall_enter_from_user_mode+0x26/0x80 [ 1155.606551][T19745] 8021q: adding VLAN 0 to HW filter on device team409 [ 1155.611211][T19753] do_syscall_64+0x38/0xb0 [ 1155.611242][T19753] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1155.611264][T19753] RIP: 0033:0x7ffba087e1ea [ 1155.611281][T19753] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 09 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1155.718694][T19753] RSP: 002b:00007ffba159aee8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1155.727149][T19753] RAX: ffffffffffffffda RBX: 00007ffba159af80 RCX: 00007ffba087e1ea [ 1155.735139][T19753] RDX: 0000000020000140 RSI: 0000000020000000 RDI: 00007ffba159af40 [ 1155.743142][T19753] RBP: 0000000020000140 R08: 00007ffba159af80 R09: 0000000000000000 [ 1155.751145][T19753] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1155.759143][T19753] R13: 00007ffba159af40 R14: 0000000000000160 R15: 0000000020000080 [ 1155.767159][T19753] [ 1155.843075][T19737] gre345: entered promiscuous mode [ 1155.861439][T19737] team419: Port device gre345 added [ 1156.037467][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1156.048957][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1156.059133][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1156.070325][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1156.080117][T15110] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1156.093068][T15110] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1156.104018][T15110] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1156.118541][T15110] usb 5-1: config 0 descriptor?? [ 1156.609221][T15110] keytouch 0003:0926:3333.0072: fixing up Keytouch IEC report descriptor [ 1156.621689][T15110] keytouch 0003:0926:3333.0072: usb_submit_urb(out) failed: -90 [ 1156.631799][T15110] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.0072/input/input125 [ 1156.716787][T15110] keytouch 0003:0926:3333.0072: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 1156.810734][T15110] usb 5-1: USB disconnect, device number 76 20:11:27 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f0000000140)={0x14, &(0x7f00000000c0)={0x0, 0x1, 0x45, {0x45, 0x23, "07766bc76103a6cd52cad134923e770c0f0f6a4a49af36293404bdb3e9ab02dfc4332b4ca384fb2abbe7deaff9ef862ef0a226d8fbcb22b18ff9205ac5abdae275f535"}}, &(0x7f0000000040)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42a}}}, 0xfffffffffffffffe) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f00000001c0)={0x14, &(0x7f0000000280)={0x40, 0x0, 0xc3, {0xc3, 0x1, "aea8dadb1a4bba2bc6fa0342e2135bb353f83e5db16ab3e510ee605c3ac9260e246f44c77201529342805f6550049497e2a3a534243faa6bc77fbe72eb2c1435b4b178d09cdadf619952fbc9b6c50a4469e46c422d521b76726888a65e70dbd71103349b8b02ecf5a80deb66fdec06b2260f4296ec692f87c6c8d48d7913e4a14d30380ccedf25e33fc68357ff40f2cc63f4a42fad0d2d6a4cfb7c362c04cda321638d3009c32276a0246751d0c5acd704514f6c7f441be7ef9c22fe3881a61812"}}, &(0x7f0000000180)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x44a}}}, &(0x7f00000005c0)={0x44, &(0x7f0000000380)={0x0, 0x15, 0x87, "2723cd0d44fdf8a2eb6986487e30b703da6f151350d22a421e6f37d9bf25523323c620cc32f587ae5822267b8371c587425c7a309c9a46fa3acf0fe01e7769a2c904f9da4389c127b05ea1c3871cdd18f10ccb57ee1d95a115477aaea5d36dee738edbbd92ce1a8f9b9b761ea7c56faa95b6983d5f6d9d79eb47df3c1bd9362902cbf6a5b5fc61"}, &(0x7f0000000200)={0x0, 0xa, 0x1, 0x1}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0xa9}, &(0x7f0000000480)={0x20, 0x81, 0x2, "b54d"}, &(0x7f00000004c0)={0x20, 0x82, 0x1, '1'}, &(0x7f0000000500)={0x20, 0x83, 0x3, "a1c11f"}, &(0x7f0000000540)={0x20, 0x84, 0x4, "6c2e9163"}, &(0x7f0000000580)={0x20, 0x85, 0x3, "fda106"}}) syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) (async) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f0000000140)={0x14, &(0x7f00000000c0)={0x0, 0x1, 0x45, {0x45, 0x23, "07766bc76103a6cd52cad134923e770c0f0f6a4a49af36293404bdb3e9ab02dfc4332b4ca384fb2abbe7deaff9ef862ef0a226d8fbcb22b18ff9205ac5abdae275f535"}}, &(0x7f0000000040)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42a}}}, 0xfffffffffffffffe) (async) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f00000001c0)={0x14, &(0x7f0000000280)={0x40, 0x0, 0xc3, {0xc3, 0x1, "aea8dadb1a4bba2bc6fa0342e2135bb353f83e5db16ab3e510ee605c3ac9260e246f44c77201529342805f6550049497e2a3a534243faa6bc77fbe72eb2c1435b4b178d09cdadf619952fbc9b6c50a4469e46c422d521b76726888a65e70dbd71103349b8b02ecf5a80deb66fdec06b2260f4296ec692f87c6c8d48d7913e4a14d30380ccedf25e33fc68357ff40f2cc63f4a42fad0d2d6a4cfb7c362c04cda321638d3009c32276a0246751d0c5acd704514f6c7f441be7ef9c22fe3881a61812"}}, &(0x7f0000000180)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x44a}}}, &(0x7f00000005c0)={0x44, &(0x7f0000000380)={0x0, 0x15, 0x87, "2723cd0d44fdf8a2eb6986487e30b703da6f151350d22a421e6f37d9bf25523323c620cc32f587ae5822267b8371c587425c7a309c9a46fa3acf0fe01e7769a2c904f9da4389c127b05ea1c3871cdd18f10ccb57ee1d95a115477aaea5d36dee738edbbd92ce1a8f9b9b761ea7c56faa95b6983d5f6d9d79eb47df3c1bd9362902cbf6a5b5fc61"}, &(0x7f0000000200)={0x0, 0xa, 0x1, 0x1}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0xa9}, &(0x7f0000000480)={0x20, 0x81, 0x2, "b54d"}, &(0x7f00000004c0)={0x20, 0x82, 0x1, '1'}, &(0x7f0000000500)={0x20, 0x83, 0x3, "a1c11f"}, &(0x7f0000000540)={0x20, 0x84, 0x4, "6c2e9163"}, &(0x7f0000000580)={0x20, 0x85, 0x3, "fda106"}}) (async) 20:11:27 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xf5720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x24ab0000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:27 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:27 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe0620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:27 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x5, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x28000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1157.349534][T19761] loop0: detected capacity change from 0 to 24 [ 1157.358312][T19764] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1157.366859][T19761] MTD: Attempt to mount non-MTD device "/dev/loop0" 20:11:27 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x2, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x36000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1157.392872][T19761] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1157.394529][T19764] team420: entered promiscuous mode [ 1157.412997][T19764] 8021q: adding VLAN 0 to HW filter on device team420 20:11:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x40000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1157.482438][T19769] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1157.516152][T19777] loop0: detected capacity change from 0 to 24 20:11:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x41426592}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1157.530092][T19777] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1157.543660][T19769] team410: entered promiscuous mode [ 1157.553090][T19777] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1157.565807][T19769] 8021q: adding VLAN 0 to HW filter on device team410 20:11:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x414269e2}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1157.597033][T19772] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1157.652771][T19772] team416: entered promiscuous mode [ 1157.664283][T15110] usb 5-1: new high-speed USB device number 77 using dummy_hcd [ 1157.674813][T19772] 8021q: adding VLAN 0 to HW filter on device team416 [ 1157.787025][T19768] gre346: entered promiscuous mode [ 1157.806679][T19768] team420: Port device gre346 added [ 1157.912412][T19766] gre343: entered promiscuous mode [ 1157.920909][T19766] team416: Port device gre343 added [ 1158.047736][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1158.058827][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1158.068659][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1158.079468][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1158.089161][T15110] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1158.102146][T15110] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1158.111257][T15110] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1158.125436][T15110] usb 5-1: config 0 descriptor?? [ 1158.608569][T15110] keytouch 0003:0926:3333.0073: fixing up Keytouch IEC report descriptor [ 1158.617907][T15110] keytouch 0003:0926:3333.0073: usb_submit_urb(out) failed: -90 [ 1158.626252][T15110] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.0073/input/input126 [ 1158.718218][T15110] keytouch 0003:0926:3333.0073: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 20:11:29 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f0000000140)={0x14, &(0x7f00000000c0)={0x0, 0x1, 0x45, {0x45, 0x23, "07766bc76103a6cd52cad134923e770c0f0f6a4a49af36293404bdb3e9ab02dfc4332b4ca384fb2abbe7deaff9ef862ef0a226d8fbcb22b18ff9205ac5abdae275f535"}}, &(0x7f0000000040)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x42a}}}, 0xfffffffffffffffe) (async) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f00000001c0)={0x14, &(0x7f0000000280)={0x40, 0x0, 0xc3, {0xc3, 0x1, "aea8dadb1a4bba2bc6fa0342e2135bb353f83e5db16ab3e510ee605c3ac9260e246f44c77201529342805f6550049497e2a3a534243faa6bc77fbe72eb2c1435b4b178d09cdadf619952fbc9b6c50a4469e46c422d521b76726888a65e70dbd71103349b8b02ecf5a80deb66fdec06b2260f4296ec692f87c6c8d48d7913e4a14d30380ccedf25e33fc68357ff40f2cc63f4a42fad0d2d6a4cfb7c362c04cda321638d3009c32276a0246751d0c5acd704514f6c7f441be7ef9c22fe3881a61812"}}, &(0x7f0000000180)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x44a}}}, &(0x7f00000005c0)={0x44, &(0x7f0000000380)={0x0, 0x15, 0x87, "2723cd0d44fdf8a2eb6986487e30b703da6f151350d22a421e6f37d9bf25523323c620cc32f587ae5822267b8371c587425c7a309c9a46fa3acf0fe01e7769a2c904f9da4389c127b05ea1c3871cdd18f10ccb57ee1d95a115477aaea5d36dee738edbbd92ce1a8f9b9b761ea7c56faa95b6983d5f6d9d79eb47df3c1bd9362902cbf6a5b5fc61"}, &(0x7f0000000200)={0x0, 0xa, 0x1, 0x1}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0xa9}, &(0x7f0000000480)={0x20, 0x81, 0x2, "b54d"}, &(0x7f00000004c0)={0x20, 0x82, 0x1, '1'}, &(0x7f0000000500)={0x20, 0x83, 0x3, "a1c11f"}, &(0x7f0000000540)={0x20, 0x84, 0x4, "6c2e9163"}, &(0x7f0000000580)={0x20, 0x85, 0x3, "fda106"}}) 20:11:29 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x3, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:29 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x6, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x60000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:29 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xf6720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:29 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe1620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1158.813902][T19767] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1158.823753][T19767] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1158.835518][T17997] usb 5-1: USB disconnect, device number 77 20:11:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0x92654241}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1158.862122][T19794] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1158.884591][T19796] loop0: detected capacity change from 0 to 24 20:11:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xe0000000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:29 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x4, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1158.916588][T19796] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1158.939051][T19794] team421: entered promiscuous mode [ 1158.941857][T19796] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1158.948272][T19794] 8021q: adding VLAN 0 to HW filter on device team421 20:11:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xe2694241}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xe8030000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:29 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x5, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1159.049108][T19810] loop0: detected capacity change from 0 to 24 [ 1159.056352][T19810] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1159.065179][T19810] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1159.182084][T19815] loop0: detected capacity change from 0 to 24 [ 1159.189880][T19815] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1159.197210][T19815] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1159.257034][T19800] gre347: entered promiscuous mode [ 1159.295467][T19800] team421: Port device gre347 added [ 1159.301720][T19802] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1159.329031][T19802] team411: entered promiscuous mode [ 1159.334512][T19802] 8021q: adding VLAN 0 to HW filter on device team411 [ 1159.352671][T19804] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1159.357467][T17997] usb 5-1: new high-speed USB device number 78 using dummy_hcd [ 1159.376449][T19804] team417: entered promiscuous mode [ 1159.388085][T19804] 8021q: adding VLAN 0 to HW filter on device team417 [ 1159.514448][T19797] gre344: entered promiscuous mode [ 1159.524217][T19797] team417: Port device gre344 added [ 1159.777386][T17997] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1159.789826][T17997] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1159.800352][T17997] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1159.811209][T17997] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1159.820910][T17997] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1159.833816][T17997] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1159.842879][T17997] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1159.852153][T17997] usb 5-1: config 0 descriptor?? [ 1160.318411][T17997] keytouch 0003:0926:3333.0074: fixing up Keytouch IEC report descriptor [ 1160.329441][T17997] keytouch 0003:0926:3333.0074: usb_submit_urb(out) failed: -90 [ 1160.338054][T17997] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.0074/input/input127 [ 1160.429861][T17997] keytouch 0003:0926:3333.0074: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 1160.531722][T17997] usb 5-1: USB disconnect, device number 78 20:11:31 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332002d00010000018000000000000001010009210000000122010009058103000000000009050203000000000000"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:11:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xf4010000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:31 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x6, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:31 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xf7720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:31 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x7, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:31 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe2620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xffe50000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1161.061032][T19824] loop0: detected capacity change from 0 to 24 [ 1161.069152][T19822] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1161.083320][T19824] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1161.104537][T19822] team422: entered promiscuous mode 20:11:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xfff90006}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1161.110846][T19822] 8021q: adding VLAN 0 to HW filter on device team422 [ 1161.115189][T19824] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:11:31 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x7, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty=0xffff0000}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1161.178895][T19832] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:11:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:31 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x9, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1161.238500][T19841] loop0: detected capacity change from 0 to 24 [ 1161.251720][T19841] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1161.260195][T19841] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1161.261677][T19832] team418: entered promiscuous mode [ 1161.278504][T19832] 8021q: adding VLAN 0 to HW filter on device team418 [ 1161.329959][T19834] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1161.333992][T19843] loop0: detected capacity change from 0 to 24 [ 1161.367506][T12655] usb 5-1: new high-speed USB device number 79 using dummy_hcd [ 1161.381381][T19843] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1161.389633][T19834] team412: entered promiscuous mode [ 1161.408262][T19834] 8021q: adding VLAN 0 to HW filter on device team412 [ 1161.415669][T19843] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1161.585952][T19833] gre348: entered promiscuous mode [ 1161.605151][T19833] team422: Port device gre348 added [ 1161.651204][T12655] usb 5-1: no configurations [ 1161.655937][T12655] usb 5-1: can't read configurations, error -22 [ 1161.703623][T19827] gre345: entered promiscuous mode [ 1161.712149][T19827] team418: Port device gre345 added [ 1161.817379][T12655] usb 5-1: new high-speed USB device number 80 using dummy_hcd [ 1162.097627][T12655] usb 5-1: no configurations [ 1162.102296][T12655] usb 5-1: can't read configurations, error -22 [ 1162.109557][T12655] usb usb5-port1: attempt power cycle [ 1162.537346][T12655] usb 5-1: new high-speed USB device number 81 using dummy_hcd [ 1162.667580][T12655] usb 5-1: no configurations [ 1162.672228][T12655] usb 5-1: can't read configurations, error -22 [ 1162.837395][T12655] usb 5-1: new high-speed USB device number 82 using dummy_hcd [ 1162.977486][T12655] usb 5-1: no configurations [ 1162.982122][T12655] usb 5-1: can't read configurations, error -22 [ 1162.992091][T12655] usb usb5-port1: unable to enumerate USB device 20:11:34 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332002d00010000018000000000000001010009210000000122010009058103000000000009050203000000000000"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:11:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x2, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:34 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0xa, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:34 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x8, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:34 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xf8720400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:34 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe3620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x3, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x4, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1164.187464][T19855] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1164.198844][T19853] loop0: detected capacity change from 0 to 24 [ 1164.216631][T19853] MTD: Attempt to mount non-MTD device "/dev/loop0" 20:11:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x5, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1164.247563][T19853] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:11:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x6, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:34 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0xc, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x7, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1164.290238][T19855] team413: entered promiscuous mode [ 1164.301298][T19855] 8021q: adding VLAN 0 to HW filter on device team413 [ 1164.372174][T19874] loop0: detected capacity change from 0 to 24 [ 1164.380085][T19862] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1164.413734][T19874] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1164.421537][T19874] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1164.425021][T19862] team423: entered promiscuous mode [ 1164.435075][T19862] 8021q: adding VLAN 0 to HW filter on device team423 [ 1164.454123][T19864] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1164.484720][T15110] usb 5-1: new high-speed USB device number 83 using dummy_hcd [ 1164.500574][T19864] team419: entered promiscuous mode [ 1164.506086][T19864] 8021q: adding VLAN 0 to HW filter on device team419 [ 1164.605147][T19867] gre349: entered promiscuous mode [ 1164.622796][T19867] team423: Port device gre349 added [ 1164.728127][T19868] gre346: entered promiscuous mode [ 1164.735282][T19868] team419: Port device gre346 added [ 1164.777884][T15110] usb 5-1: no configurations [ 1164.782561][T15110] usb 5-1: can't read configurations, error -22 [ 1164.947356][T15110] usb 5-1: new high-speed USB device number 84 using dummy_hcd [ 1165.237431][T15110] usb 5-1: no configurations [ 1165.242084][T15110] usb 5-1: can't read configurations, error -22 [ 1165.249077][T15110] usb usb5-port1: attempt power cycle [ 1165.677488][T15110] usb 5-1: new high-speed USB device number 85 using dummy_hcd [ 1165.807505][T15110] usb 5-1: no configurations [ 1165.812172][T15110] usb 5-1: can't read configurations, error -22 [ 1165.970350][T15110] usb 5-1: new high-speed USB device number 86 using dummy_hcd [ 1166.137667][T15110] usb 5-1: no configurations [ 1166.142304][T15110] usb 5-1: can't read configurations, error -22 [ 1166.149436][T15110] usb usb5-port1: unable to enumerate USB device 20:11:37 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332002d00010000018000000000000001010009210000000122010009058103000000000009050203000000000000"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:11:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x8, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:37 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x9, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:37 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0xd, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:37 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xfeff0000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:37 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe4010000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0xa, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1167.236238][T19881] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1167.247141][T19882] loop0: detected capacity change from 0 to 24 20:11:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0xe, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1167.280605][T19882] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1167.303097][T19881] team420: entered promiscuous mode [ 1167.309736][T19882] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1167.319382][T19881] 8021q: adding VLAN 0 to HW filter on device team420 20:11:37 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0xf, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x11, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1167.436710][T19896] loop0: detected capacity change from 0 to 24 [ 1167.444334][T19896] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1167.452611][T19896] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:11:37 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x10, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x14, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1167.538684][T19900] loop0: detected capacity change from 0 to 24 [ 1167.545883][T19900] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1167.556356][T19900] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1167.664808][T19887] gre347: entered promiscuous mode [ 1167.677594][T15110] usb 5-1: new high-speed USB device number 87 using dummy_hcd [ 1167.690485][T19887] team420: Port device gre347 added [ 1167.696285][T19888] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1167.720644][T19888] team424: entered promiscuous mode [ 1167.726458][T19888] 8021q: adding VLAN 0 to HW filter on device team424 [ 1167.743722][T19891] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1167.771080][T19891] team414: entered promiscuous mode [ 1167.776894][T19891] 8021q: adding VLAN 0 to HW filter on device team414 [ 1167.931005][T19883] gre350: entered promiscuous mode [ 1167.941715][T19883] team424: Port device gre350 added [ 1167.957662][T15110] usb 5-1: no configurations [ 1167.962315][T15110] usb 5-1: can't read configurations, error -22 [ 1168.127485][T15110] usb 5-1: new high-speed USB device number 88 using dummy_hcd [ 1168.407589][T15110] usb 5-1: no configurations [ 1168.412303][T15110] usb 5-1: can't read configurations, error -22 [ 1168.421103][T15110] usb usb5-port1: attempt power cycle [ 1168.837361][T15110] usb 5-1: new high-speed USB device number 89 using dummy_hcd [ 1168.969322][T15110] usb 5-1: no configurations [ 1168.973949][T15110] usb 5-1: can't read configurations, error -22 [ 1169.127364][T15110] usb 5-1: new high-speed USB device number 90 using dummy_hcd [ 1169.257623][T15110] usb 5-1: no configurations [ 1169.262325][T15110] usb 5-1: can't read configurations, error -22 [ 1169.268987][T15110] usb usb5-port1: unable to enumerate USB device 20:11:40 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000280)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x40, 0x1b96, 0xf, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xa8, 0x0, 0x6, [{{0x9, 0x4, 0x0, 0x70, 0x2, 0x3, 0x1, 0x2, 0x3f, {0x9, 0x21, 0x4, 0x9, 0x1, {0x22, 0xed4}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x81, 0x7, 0x6}}}}}]}}]}}, &(0x7f0000000a00)={0xa, &(0x7f0000000300)={0xa, 0x6, 0x200, 0xc0, 0x6, 0x4, 0x8, 0xff}, 0x3c, &(0x7f0000000340)={0x5, 0xf, 0x3c, 0x3, [@ss_container_id={0x14, 0x10, 0x4, 0x4, "7ceb5e54c2051af74e95fcd4e44f5fb7"}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x1, 0xa, 0x2}, @ssp_cap={0x1c, 0x10, 0xa, 0x2, 0x4, 0x2, 0x0, 0x0, [0x3f, 0x30, 0xc0f0, 0x30]}]}, 0x4, [{0xb2, &(0x7f0000000680)=@string={0xb2, 0x3, "850e0671e753bf4ca5c5f5672e14df694a56ceb02b9d16635266897ebcbfe9a2f3d067e65372df2b92be535857c5067cdd144de2a59f657fc54ba1d2ee98a3a2ec6a807a48697794988d9a9347efc8d8c0b69f3f545e3f3d69e0ac245d9fe14e60b5a39d8d993919d1c2ed6ab6d49abed08d418e242aaf24979f457e148df5dd182095f9f09ce8a33f64d5f74f4cdaad62eaef88c4e8f09a80061a2a5d0e63facb1ea9492f6d511cbdad62603be9b6a2"}}, {0xc7, &(0x7f0000000740)=@string={0xc7, 0x3, "a41030945d0f910ada2cf4575cb963f1ed9924f24fda5e66de61cedd6509157490051de47baf159f0b77fe49e9e5d847e8cd83f9a0ea34cfd2fc4d4bf7c57b2d1947842392d45ba395cb824a7ee8515c0ce3554cca7fae7d4eeb88e81bf2d0173056a8564204000782f9792984b1d5c8813ad9991711f37204e34938bc06014945fa23da057de9e1fa768a98c3769723af372f0d20b8bc4c2822cfa32df432718db556d6043877b89842b5acc2de9030c4c7ed5bcd7fd42f2b967ab85b6994e1688e37d48c"}}, {0xd3, &(0x7f0000000840)=@string={0xd3, 0x3, "66e6bc0b4833babc85243ddbb3532d204bb8ea4a2baed22b3f0cff6d4cb2921ddfc11286452cc0ad6c43dd978dcfa11e33d030d491c6e6fc7db09aab5f1130db02f64da3cf536c9cc2a0bcad77c9486683d48b0d9e6fb6c893387002019765df1f4823553709775d0e44167147481bf6d5530cee00cf957dca58def04aebef0729eeeaa783e0cd25c8d97c08f25ab33e71d7c7851f9d91a97f4c086691a305dd588f36b895a66fa1f677861e4efc003615d2b12f3d754071251c07daf7d3f46d8f052d17d567ab4accbcde348e2d15e34a"}}, {0x96, &(0x7f0000000940)=@string={0x96, 0x3, "95a48e57cd04bee16d05a8dea99edc8530d95b1bcc6c678b98018d0b7b73092e47281954e44c3b9418ce8a4a2041bd06c19420f628e4392918ae6d7a349fb0e7993a82d0c50fc94cf7d00cb5396593952567c4cca792b53b7a6bdd956151dba46bfd164df001f52cb0ef7fe874ce622bffffce409d046233abefab9038dbc8f903903461e53bc104bf267fa36985fe3b585a08f8"}}]}) syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x40, 0x44f, 0xb65d, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3f, 0x90, 0x3, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x74, {0x9, 0x21, 0x8, 0x3, 0x1, {0x22, 0xe11}}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x3, 0x9, 0x6}}}}}]}}]}}, &(0x7f0000000400)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x250, 0x2, 0x11, 0xfc, 0x30, 0x6}, 0xf, &(0x7f0000000100)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x3, 0xff, 0x401}]}, 0x7, [{0xba, &(0x7f0000000140)=@string={0xba, 0x3, "f6bc9fb93e4436b6023fbf9c509ae00c782fda3f4bde8fd06cd42591394dbee1c5b6db045af1c5b31defdfc4a052d00e705ee8586f8d32cbc3c63c86fdddd884468a985eca8c38e4c73617ce3ca113655608526482ce2e23134c3efabf86b588ab3696cc872b2c93aa6e6a268d0eb1a73cbfc3ad283faf14250c75e502b633d8a31a870b8fa45267b26bb4f9bc0fafbcc2679801c375ec621f02445856a3d1aedea742f10c6951f29c41dbf3fdd9298d81c2ccfd9c785205"}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x380a}}, {0xad, &(0x7f00000005c0)=@string={0xad, 0x3, "535ace28b08d7bec89ff83a6f82e2cf3e6aa9088dcb93894bc2ce3aeb664e6e9b64def55b2e2a2cacd6c454ef802c7d6ed2fc573dbe0e4c4c17a0496cd8c509c5c2c0b09b6a7c60cec1ccbe24b0986d24ae1221fbf3b577385874e61aab8e20d7d00e3567357ee9949c6680a95e3c9a54903e90a9d3f0a9f54e599bf3a5b0617559dc235c5ab6af347246096c8359963f18743af72be9589a2b1831ce56249410a97c98e5a6c1b7a3a892c"}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x3001}}, {0x102, &(0x7f0000000480)=@string={0x102, 0x3, "4810d5bc65b4dfcdc29f333ab6e3a89c241e061b5d7e69271f9b146528b906ef45a69e4408bf0cb1279de5253e0bf1595f36bfc8703099619a4c8038fe3b758e22875b5d929accfd124a5554bc51afab4622ac53692b9930ebbe5e31899909a5a2fce205305ca1c90759e6b4fc8236ba18f769faad03ab25f4e9b76c1a1e97ded4fb37fdeb9f829b509dc1989d374e5f00224726f52698c0e93376a12cb22ace885815a5a81ed3c2b2093631d33f790d95eeb08b90b8089b42a46503c7cd2b3c0a50e5cd38d7b1bc624296598db7d7e8c9dd41ee1ba62a275b9fecd555c424bda08cc9b5c53fb7dcde636bc1799b25a2ad622c7442d5bafd97b4fef2f8677630"}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x400a}}, {0x27, &(0x7f00000003c0)=@string={0x27, 0x3, "250a7e11a89280acdc9a9f5884f694f58d3bd2c4b54e6e3509694bd0cb85d15bd51107dfa0"}}]}) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:11:40 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x11, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x28, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:40 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe4030000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:40 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0xa, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:40 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xfeffffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x36, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1170.286309][T19909] loop0: detected capacity change from 0 to 24 [ 1170.304494][T19911] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1170.315065][T19909] MTD: Attempt to mount non-MTD device "/dev/loop0" 20:11:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x60, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:40 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x16, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0xe0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1170.337727][T19909] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1170.349219][T19911] team421: entered promiscuous mode [ 1170.364677][T19911] 8021q: adding VLAN 0 to HW filter on device team421 20:11:40 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x17, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1170.415868][T19918] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1170.422311][T19923] loop0: detected capacity change from 0 to 24 [ 1170.434497][T19923] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1170.442556][T19923] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:11:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x1f4, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1170.478044][T19918] team415: entered promiscuous mode [ 1170.490046][T19918] 8021q: adding VLAN 0 to HW filter on device team415 [ 1170.501005][T19926] loop0: detected capacity change from 0 to 24 [ 1170.513051][T19926] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1170.543184][T19926] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1170.543601][T19920] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1170.577129][T19920] team425: entered promiscuous mode [ 1170.594146][T19920] 8021q: adding VLAN 0 to HW filter on device team425 [ 1170.746133][T19917] gre348: entered promiscuous mode [ 1170.758373][T19917] team421: Port device gre348 added [ 1170.778654][T12655] usb 5-1: new high-speed USB device number 91 using dummy_hcd [ 1170.854731][T19910] gre351: entered promiscuous mode [ 1170.861497][T19910] team425: Port device gre351 added [ 1171.147410][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1171.160219][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1171.170341][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1171.181194][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1171.190896][T12655] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1171.204260][T12655] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1171.213321][T12655] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1171.225779][T12655] usb 5-1: config 0 descriptor?? [ 1171.690060][T19916] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1171.698783][T19916] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1171.708317][T12655] keytouch 0003:0926:3333.0075: fixing up Keytouch IEC report descriptor [ 1171.717474][T12655] keytouch 0003:0926:3333.0075: usb_submit_urb(out) failed: -90 [ 1171.725781][T12655] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.0075/input/input128 [ 1171.827445][T12655] keytouch 0003:0926:3333.0075: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 1171.919521][T15110] usb 5-1: USB disconnect, device number 91 20:11:42 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000280)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x40, 0x1b96, 0xf, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xa8, 0x0, 0x6, [{{0x9, 0x4, 0x0, 0x70, 0x2, 0x3, 0x1, 0x2, 0x3f, {0x9, 0x21, 0x4, 0x9, 0x1, {0x22, 0xed4}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x81, 0x7, 0x6}}}}}]}}]}}, &(0x7f0000000a00)={0xa, &(0x7f0000000300)={0xa, 0x6, 0x200, 0xc0, 0x6, 0x4, 0x8, 0xff}, 0x3c, &(0x7f0000000340)={0x5, 0xf, 0x3c, 0x3, [@ss_container_id={0x14, 0x10, 0x4, 0x4, "7ceb5e54c2051af74e95fcd4e44f5fb7"}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x1, 0xa, 0x2}, @ssp_cap={0x1c, 0x10, 0xa, 0x2, 0x4, 0x2, 0x0, 0x0, [0x3f, 0x30, 0xc0f0, 0x30]}]}, 0x4, [{0xb2, &(0x7f0000000680)=@string={0xb2, 0x3, "850e0671e753bf4ca5c5f5672e14df694a56ceb02b9d16635266897ebcbfe9a2f3d067e65372df2b92be535857c5067cdd144de2a59f657fc54ba1d2ee98a3a2ec6a807a48697794988d9a9347efc8d8c0b69f3f545e3f3d69e0ac245d9fe14e60b5a39d8d993919d1c2ed6ab6d49abed08d418e242aaf24979f457e148df5dd182095f9f09ce8a33f64d5f74f4cdaad62eaef88c4e8f09a80061a2a5d0e63facb1ea9492f6d511cbdad62603be9b6a2"}}, {0xc7, &(0x7f0000000740)=@string={0xc7, 0x3, "a41030945d0f910ada2cf4575cb963f1ed9924f24fda5e66de61cedd6509157490051de47baf159f0b77fe49e9e5d847e8cd83f9a0ea34cfd2fc4d4bf7c57b2d1947842392d45ba395cb824a7ee8515c0ce3554cca7fae7d4eeb88e81bf2d0173056a8564204000782f9792984b1d5c8813ad9991711f37204e34938bc06014945fa23da057de9e1fa768a98c3769723af372f0d20b8bc4c2822cfa32df432718db556d6043877b89842b5acc2de9030c4c7ed5bcd7fd42f2b967ab85b6994e1688e37d48c"}}, {0xd3, &(0x7f0000000840)=@string={0xd3, 0x3, "66e6bc0b4833babc85243ddbb3532d204bb8ea4a2baed22b3f0cff6d4cb2921ddfc11286452cc0ad6c43dd978dcfa11e33d030d491c6e6fc7db09aab5f1130db02f64da3cf536c9cc2a0bcad77c9486683d48b0d9e6fb6c893387002019765df1f4823553709775d0e44167147481bf6d5530cee00cf957dca58def04aebef0729eeeaa783e0cd25c8d97c08f25ab33e71d7c7851f9d91a97f4c086691a305dd588f36b895a66fa1f677861e4efc003615d2b12f3d754071251c07daf7d3f46d8f052d17d567ab4accbcde348e2d15e34a"}}, {0x96, &(0x7f0000000940)=@string={0x96, 0x3, "95a48e57cd04bee16d05a8dea99edc8530d95b1bcc6c678b98018d0b7b73092e47281954e44c3b9418ce8a4a2041bd06c19420f628e4392918ae6d7a349fb0e7993a82d0c50fc94cf7d00cb5396593952567c4cca792b53b7a6bdd956151dba46bfd164df001f52cb0ef7fe874ce622bffffce409d046233abefab9038dbc8f903903461e53bc104bf267fa36985fe3b585a08f8"}}]}) syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x40, 0x44f, 0xb65d, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3f, 0x90, 0x3, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x74, {0x9, 0x21, 0x8, 0x3, 0x1, {0x22, 0xe11}}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x3, 0x9, 0x6}}}}}]}}]}}, &(0x7f0000000400)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x250, 0x2, 0x11, 0xfc, 0x30, 0x6}, 0xf, &(0x7f0000000100)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x3, 0xff, 0x401}]}, 0x7, [{0xba, &(0x7f0000000140)=@string={0xba, 0x3, "f6bc9fb93e4436b6023fbf9c509ae00c782fda3f4bde8fd06cd42591394dbee1c5b6db045af1c5b31defdfc4a052d00e705ee8586f8d32cbc3c63c86fdddd884468a985eca8c38e4c73617ce3ca113655608526482ce2e23134c3efabf86b588ab3696cc872b2c93aa6e6a268d0eb1a73cbfc3ad283faf14250c75e502b633d8a31a870b8fa45267b26bb4f9bc0fafbcc2679801c375ec621f02445856a3d1aedea742f10c6951f29c41dbf3fdd9298d81c2ccfd9c785205"}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x380a}}, {0xad, &(0x7f00000005c0)=@string={0xad, 0x3, "535ace28b08d7bec89ff83a6f82e2cf3e6aa9088dcb93894bc2ce3aeb664e6e9b64def55b2e2a2cacd6c454ef802c7d6ed2fc573dbe0e4c4c17a0496cd8c509c5c2c0b09b6a7c60cec1ccbe24b0986d24ae1221fbf3b577385874e61aab8e20d7d00e3567357ee9949c6680a95e3c9a54903e90a9d3f0a9f54e599bf3a5b0617559dc235c5ab6af347246096c8359963f18743af72be9589a2b1831ce56249410a97c98e5a6c1b7a3a892c"}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x3001}}, {0x102, &(0x7f0000000480)=@string={0x102, 0x3, "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"}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x400a}}, {0x27, &(0x7f00000003c0)=@string={0x27, 0x3, "250a7e11a89280acdc9a9f5884f694f58d3bd2c4b54e6e3509694bd0cb85d15bd51107dfa0"}}]}) (async, rerun: 32) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) (rerun: 32) 20:11:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x300, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:42 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0xb, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:42 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x18, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:42 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe4620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:42 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xff040000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x3e8, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1172.462819][T19936] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1172.473958][T19938] loop0: detected capacity change from 0 to 24 20:11:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x500, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x600, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1172.506283][T19938] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1172.522216][T19936] team426: entered promiscuous mode [ 1172.532804][T19936] 8021q: adding VLAN 0 to HW filter on device team426 [ 1172.542095][T19938] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:11:43 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x19, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1172.574108][T19945] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:11:43 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0xc, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x700, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1172.627575][T19945] team416: entered promiscuous mode [ 1172.633400][T19945] 8021q: adding VLAN 0 to HW filter on device team416 [ 1172.708128][T19952] loop0: detected capacity change from 0 to 24 [ 1172.726303][T19952] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1172.742258][T19952] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1172.767237][ T5045] usb 5-1: new high-speed USB device number 92 using dummy_hcd [ 1172.853846][T19944] gre352: entered promiscuous mode [ 1172.872415][T19944] team426: Port device gre352 added [ 1172.878272][T19946] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1172.905857][T19946] team422: entered promiscuous mode [ 1172.914621][T19946] 8021q: adding VLAN 0 to HW filter on device team422 [ 1173.026196][T19937] gre349: entered promiscuous mode [ 1173.035078][T19937] team422: Port device gre349 added [ 1173.041027][T19957] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1173.064164][T19957] team417: entered promiscuous mode [ 1173.076223][T19957] 8021q: adding VLAN 0 to HW filter on device team417 [ 1173.167538][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1173.182306][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1173.192316][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1173.206613][ T5045] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1173.216337][ T5045] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1173.229567][ T5045] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1173.240369][ T5045] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1173.254569][ T5045] usb 5-1: config 0 descriptor?? [ 1173.502106][T19959] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1173.511848][T19959] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1173.520453][T19959] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1173.529009][T19959] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1173.537045][T19959] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1173.545710][T19959] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1173.553902][T19959] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1173.563103][ T5045] keytouch 0003:0926:3333.0076: fixing up Keytouch IEC report descriptor [ 1173.574074][T19959] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1173.582685][ T5045] keytouch 0003:0926:3333.0076: usb_submit_urb(out) failed: -90 [ 1173.593548][ T5045] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.0076/input/input129 [ 1173.689129][ T5045] keytouch 0003:0926:3333.0076: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 1174.867472][T15110] usb 5-1: reset high-speed USB device number 92 using dummy_hcd [ 1175.077373][T15110] usb 5-1: device descriptor read/64, error 1 [ 1175.360021][T15110] usb 5-1: reset high-speed USB device number 92 using dummy_hcd 20:11:45 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000280)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x40, 0x1b96, 0xf, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xa8, 0x0, 0x6, [{{0x9, 0x4, 0x0, 0x70, 0x2, 0x3, 0x1, 0x2, 0x3f, {0x9, 0x21, 0x4, 0x9, 0x1, {0x22, 0xed4}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x81, 0x7, 0x6}}}}}]}}]}}, &(0x7f0000000a00)={0xa, &(0x7f0000000300)={0xa, 0x6, 0x200, 0xc0, 0x6, 0x4, 0x8, 0xff}, 0x3c, &(0x7f0000000340)={0x5, 0xf, 0x3c, 0x3, [@ss_container_id={0x14, 0x10, 0x4, 0x4, "7ceb5e54c2051af74e95fcd4e44f5fb7"}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x1, 0xa, 0x2}, @ssp_cap={0x1c, 0x10, 0xa, 0x2, 0x4, 0x2, 0x0, 0x0, [0x3f, 0x30, 0xc0f0, 0x30]}]}, 0x4, [{0xb2, &(0x7f0000000680)=@string={0xb2, 0x3, "850e0671e753bf4ca5c5f5672e14df694a56ceb02b9d16635266897ebcbfe9a2f3d067e65372df2b92be535857c5067cdd144de2a59f657fc54ba1d2ee98a3a2ec6a807a48697794988d9a9347efc8d8c0b69f3f545e3f3d69e0ac245d9fe14e60b5a39d8d993919d1c2ed6ab6d49abed08d418e242aaf24979f457e148df5dd182095f9f09ce8a33f64d5f74f4cdaad62eaef88c4e8f09a80061a2a5d0e63facb1ea9492f6d511cbdad62603be9b6a2"}}, {0xc7, &(0x7f0000000740)=@string={0xc7, 0x3, "a41030945d0f910ada2cf4575cb963f1ed9924f24fda5e66de61cedd6509157490051de47baf159f0b77fe49e9e5d847e8cd83f9a0ea34cfd2fc4d4bf7c57b2d1947842392d45ba395cb824a7ee8515c0ce3554cca7fae7d4eeb88e81bf2d0173056a8564204000782f9792984b1d5c8813ad9991711f37204e34938bc06014945fa23da057de9e1fa768a98c3769723af372f0d20b8bc4c2822cfa32df432718db556d6043877b89842b5acc2de9030c4c7ed5bcd7fd42f2b967ab85b6994e1688e37d48c"}}, {0xd3, &(0x7f0000000840)=@string={0xd3, 0x3, "66e6bc0b4833babc85243ddbb3532d204bb8ea4a2baed22b3f0cff6d4cb2921ddfc11286452cc0ad6c43dd978dcfa11e33d030d491c6e6fc7db09aab5f1130db02f64da3cf536c9cc2a0bcad77c9486683d48b0d9e6fb6c893387002019765df1f4823553709775d0e44167147481bf6d5530cee00cf957dca58def04aebef0729eeeaa783e0cd25c8d97c08f25ab33e71d7c7851f9d91a97f4c086691a305dd588f36b895a66fa1f677861e4efc003615d2b12f3d754071251c07daf7d3f46d8f052d17d567ab4accbcde348e2d15e34a"}}, {0x96, &(0x7f0000000940)=@string={0x96, 0x3, "95a48e57cd04bee16d05a8dea99edc8530d95b1bcc6c678b98018d0b7b73092e47281954e44c3b9418ce8a4a2041bd06c19420f628e4392918ae6d7a349fb0e7993a82d0c50fc94cf7d00cb5396593952567c4cca792b53b7a6bdd956151dba46bfd164df001f52cb0ef7fe874ce622bffffce409d046233abefab9038dbc8f903903461e53bc104bf267fa36985fe3b585a08f8"}}]}) syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x40, 0x44f, 0xb65d, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3f, 0x90, 0x3, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x74, {0x9, 0x21, 0x8, 0x3, 0x1, {0x22, 0xe11}}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x3, 0x9, 0x6}}}}}]}}]}}, &(0x7f0000000400)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x250, 0x2, 0x11, 0xfc, 0x30, 0x6}, 0xf, &(0x7f0000000100)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x3, 0xff, 0x401}]}, 0x7, [{0xba, &(0x7f0000000140)=@string={0xba, 0x3, "f6bc9fb93e4436b6023fbf9c509ae00c782fda3f4bde8fd06cd42591394dbee1c5b6db045af1c5b31defdfc4a052d00e705ee8586f8d32cbc3c63c86fdddd884468a985eca8c38e4c73617ce3ca113655608526482ce2e23134c3efabf86b588ab3696cc872b2c93aa6e6a268d0eb1a73cbfc3ad283faf14250c75e502b633d8a31a870b8fa45267b26bb4f9bc0fafbcc2679801c375ec621f02445856a3d1aedea742f10c6951f29c41dbf3fdd9298d81c2ccfd9c785205"}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x380a}}, {0xad, &(0x7f00000005c0)=@string={0xad, 0x3, "535ace28b08d7bec89ff83a6f82e2cf3e6aa9088dcb93894bc2ce3aeb664e6e9b64def55b2e2a2cacd6c454ef802c7d6ed2fc573dbe0e4c4c17a0496cd8c509c5c2c0b09b6a7c60cec1ccbe24b0986d24ae1221fbf3b577385874e61aab8e20d7d00e3567357ee9949c6680a95e3c9a54903e90a9d3f0a9f54e599bf3a5b0617559dc235c5ab6af347246096c8359963f18743af72be9589a2b1831ce56249410a97c98e5a6c1b7a3a892c"}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x3001}}, {0x102, &(0x7f0000000480)=@string={0x102, 0x3, "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"}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x400a}}, {0x27, &(0x7f00000003c0)=@string={0x27, 0x3, "250a7e11a89280acdc9a9f5884f694f58d3bd2c4b54e6e3509694bd0cb85d15bd51107dfa0"}}]}) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) (async) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_connect$hid(0x6, 0x36, &(0x7f0000000280)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x40, 0x1b96, 0xf, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0xa8, 0x0, 0x6, [{{0x9, 0x4, 0x0, 0x70, 0x2, 0x3, 0x1, 0x2, 0x3f, {0x9, 0x21, 0x4, 0x9, 0x1, {0x22, 0xed4}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x81, 0x7, 0x6}}}}}]}}]}}, &(0x7f0000000a00)={0xa, &(0x7f0000000300)={0xa, 0x6, 0x200, 0xc0, 0x6, 0x4, 0x8, 0xff}, 0x3c, &(0x7f0000000340)={0x5, 0xf, 0x3c, 0x3, [@ss_container_id={0x14, 0x10, 0x4, 0x4, "7ceb5e54c2051af74e95fcd4e44f5fb7"}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0x1, 0xa, 0x2}, @ssp_cap={0x1c, 0x10, 0xa, 0x2, 0x4, 0x2, 0x0, 0x0, [0x3f, 0x30, 0xc0f0, 0x30]}]}, 0x4, [{0xb2, &(0x7f0000000680)=@string={0xb2, 0x3, "850e0671e753bf4ca5c5f5672e14df694a56ceb02b9d16635266897ebcbfe9a2f3d067e65372df2b92be535857c5067cdd144de2a59f657fc54ba1d2ee98a3a2ec6a807a48697794988d9a9347efc8d8c0b69f3f545e3f3d69e0ac245d9fe14e60b5a39d8d993919d1c2ed6ab6d49abed08d418e242aaf24979f457e148df5dd182095f9f09ce8a33f64d5f74f4cdaad62eaef88c4e8f09a80061a2a5d0e63facb1ea9492f6d511cbdad62603be9b6a2"}}, {0xc7, &(0x7f0000000740)=@string={0xc7, 0x3, "a41030945d0f910ada2cf4575cb963f1ed9924f24fda5e66de61cedd6509157490051de47baf159f0b77fe49e9e5d847e8cd83f9a0ea34cfd2fc4d4bf7c57b2d1947842392d45ba395cb824a7ee8515c0ce3554cca7fae7d4eeb88e81bf2d0173056a8564204000782f9792984b1d5c8813ad9991711f37204e34938bc06014945fa23da057de9e1fa768a98c3769723af372f0d20b8bc4c2822cfa32df432718db556d6043877b89842b5acc2de9030c4c7ed5bcd7fd42f2b967ab85b6994e1688e37d48c"}}, {0xd3, &(0x7f0000000840)=@string={0xd3, 0x3, "66e6bc0b4833babc85243ddbb3532d204bb8ea4a2baed22b3f0cff6d4cb2921ddfc11286452cc0ad6c43dd978dcfa11e33d030d491c6e6fc7db09aab5f1130db02f64da3cf536c9cc2a0bcad77c9486683d48b0d9e6fb6c893387002019765df1f4823553709775d0e44167147481bf6d5530cee00cf957dca58def04aebef0729eeeaa783e0cd25c8d97c08f25ab33e71d7c7851f9d91a97f4c086691a305dd588f36b895a66fa1f677861e4efc003615d2b12f3d754071251c07daf7d3f46d8f052d17d567ab4accbcde348e2d15e34a"}}, {0x96, &(0x7f0000000940)=@string={0x96, 0x3, "95a48e57cd04bee16d05a8dea99edc8530d95b1bcc6c678b98018d0b7b73092e47281954e44c3b9418ce8a4a2041bd06c19420f628e4392918ae6d7a349fb0e7993a82d0c50fc94cf7d00cb5396593952567c4cca792b53b7a6bdd956151dba46bfd164df001f52cb0ef7fe874ce622bffffce409d046233abefab9038dbc8f903903461e53bc104bf267fa36985fe3b585a08f8"}}]}) (async) syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x40, 0x44f, 0xb65d, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x3f, 0x90, 0x3, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x74, {0x9, 0x21, 0x8, 0x3, 0x1, {0x22, 0xe11}}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x3, 0x9, 0x6}}}}}]}}]}}, &(0x7f0000000400)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x250, 0x2, 0x11, 0xfc, 0x30, 0x6}, 0xf, &(0x7f0000000100)={0x5, 0xf, 0xf, 0x1, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x4, 0x3, 0xff, 0x401}]}, 0x7, [{0xba, &(0x7f0000000140)=@string={0xba, 0x3, "f6bc9fb93e4436b6023fbf9c509ae00c782fda3f4bde8fd06cd42591394dbee1c5b6db045af1c5b31defdfc4a052d00e705ee8586f8d32cbc3c63c86fdddd884468a985eca8c38e4c73617ce3ca113655608526482ce2e23134c3efabf86b588ab3696cc872b2c93aa6e6a268d0eb1a73cbfc3ad283faf14250c75e502b633d8a31a870b8fa45267b26bb4f9bc0fafbcc2679801c375ec621f02445856a3d1aedea742f10c6951f29c41dbf3fdd9298d81c2ccfd9c785205"}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x380a}}, {0xad, &(0x7f00000005c0)=@string={0xad, 0x3, "535ace28b08d7bec89ff83a6f82e2cf3e6aa9088dcb93894bc2ce3aeb664e6e9b64def55b2e2a2cacd6c454ef802c7d6ed2fc573dbe0e4c4c17a0496cd8c509c5c2c0b09b6a7c60cec1ccbe24b0986d24ae1221fbf3b577385874e61aab8e20d7d00e3567357ee9949c6680a95e3c9a54903e90a9d3f0a9f54e599bf3a5b0617559dc235c5ab6af347246096c8359963f18743af72be9589a2b1831ce56249410a97c98e5a6c1b7a3a892c"}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x3001}}, {0x102, &(0x7f0000000480)=@string={0x102, 0x3, "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"}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x400a}}, {0x27, &(0x7f00000003c0)=@string={0x27, 0x3, "250a7e11a89280acdc9a9f5884f694f58d3bd2c4b54e6e3509694bd0cb85d15bd51107dfa0"}}]}) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) 20:11:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0xa00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:45 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x48, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:45 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xff7f0000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:45 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe4ffffff, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:45 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0xd, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0xe00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1175.518921][T19968] loop0: detected capacity change from 0 to 24 [ 1175.525896][T19968] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1175.531376][T19969] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:11:46 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x4c, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1175.565066][T19968] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1175.636305][T19969] team418: entered promiscuous mode 20:11:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x1100, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1175.662387][T19969] 8021q: adding VLAN 0 to HW filter on device team418 [ 1175.672264][T19981] loop0: detected capacity change from 0 to 24 [ 1175.689635][T19981] MTD: Attempt to mount non-MTD device "/dev/loop0" 20:11:46 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x4f, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1175.715638][T19981] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1175.715845][T19974] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:11:46 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0xe, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x1400, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1175.827155][T19974] team423: entered promiscuous mode [ 1175.858151][T19987] loop0: detected capacity change from 0 to 24 [ 1175.867468][T15110] usb 5-1: device descriptor read/64, error 1 [ 1175.875138][T19974] 8021q: adding VLAN 0 to HW filter on device team423 [ 1175.880261][T19987] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1175.896557][T19987] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1175.943276][T19975] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1175.998418][T19975] team427: entered promiscuous mode [ 1176.003985][T19975] 8021q: adding VLAN 0 to HW filter on device team427 [ 1176.137456][T15110] usb 5-1: reset high-speed USB device number 92 using dummy_hcd [ 1176.181301][T19977] gre350: entered promiscuous mode [ 1176.206473][T19977] team423: Port device gre350 added [ 1176.345072][T19978] gre353: entered promiscuous mode [ 1176.355008][T19978] team427: Port device gre353 added [ 1176.361423][T19990] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1176.392432][T19990] team419: entered promiscuous mode [ 1176.398076][T19990] 8021q: adding VLAN 0 to HW filter on device team419 [ 1176.561701][T19972] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1176.571242][T19972] misc raw-gadget: fail, usb_gadget_register_driver returned -16 20:11:47 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r1, 0x82, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:11:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x1f00, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:47 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe5620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:47 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x60, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:47 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xffff0300, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:47 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0xf, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1176.822412][T19972] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1176.832166][T19972] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1176.845941][ T5120] usb 5-1: USB disconnect, device number 92 [ 1176.858155][T15110] keytouch 0003:0926:3333.0076: usb_submit_urb(out) failed: -19 20:11:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x24ab, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1176.897556][T19999] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1176.903600][T20004] loop0: detected capacity change from 0 to 24 20:11:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x2800, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:47 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x68, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1176.965005][T19999] team424: entered promiscuous mode 20:11:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x3600, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1177.001250][T19999] 8021q: adding VLAN 0 to HW filter on device team424 20:11:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x4000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1177.072492][T20018] loop0: detected capacity change from 0 to 24 [ 1177.083044][T20010] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:11:47 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x6c, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1177.114182][T20010] team420: entered promiscuous mode [ 1177.126014][T20010] 8021q: adding VLAN 0 to HW filter on device team420 [ 1177.150024][T20011] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1177.213314][T20011] team428: entered promiscuous mode [ 1177.219677][T20011] 8021q: adding VLAN 0 to HW filter on device team428 [ 1177.222175][T20024] loop0: detected capacity change from 0 to 24 [ 1177.322804][ T5120] usb 5-1: new high-speed USB device number 93 using dummy_hcd [ 1177.383200][T20012] gre351: entered promiscuous mode [ 1177.399884][T20012] team424: Port device gre351 added [ 1177.501518][T20016] gre354: entered promiscuous mode [ 1177.509494][T20016] team428: Port device gre354 added [ 1177.568127][ T1228] ieee802154 phy0 wpan0: encryption failed: -22 [ 1177.574456][ T1228] ieee802154 phy1 wpan1: encryption failed: -22 [ 1177.697421][ T5120] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1177.708606][ T5120] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1177.718642][ T5120] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1177.730101][ T5120] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1177.739852][ T5120] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1177.752827][ T5120] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1177.762295][ T5120] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1177.775485][ T5120] usb 5-1: config 0 descriptor?? [ 1178.238460][T20007] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1178.249209][T20007] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1178.337445][ T5120] usbhid 5-1:0.0: can't add hid device: -71 [ 1178.343429][ T5120] usbhid: probe of 5-1:0.0 failed with error -71 [ 1178.351554][ T5120] usb 5-1: USB disconnect, device number 93 20:11:49 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x11, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x6000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:49 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x74, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:49 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe6000000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:49 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) r1 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r1, 0x82, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:11:49 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xffffa888, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0xab24, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1178.786500][T20030] loop0: detected capacity change from 0 to 24 [ 1178.802998][T20032] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:11:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0xe000, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:49 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x7a, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1178.843917][T20032] team425: entered promiscuous mode [ 1178.857670][T20032] 8021q: adding VLAN 0 to HW filter on device team425 20:11:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0xe5ff, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0xe803, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) [ 1178.926659][T20045] loop0: detected capacity change from 0 to 24 20:11:49 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x89, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1179.056692][T20051] loop0: detected capacity change from 0 to 24 [ 1179.064160][T20051] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1179.082317][T20051] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1179.090895][T20039] gre352: entered promiscuous mode [ 1179.107758][T12655] usb 5-1: new high-speed USB device number 94 using dummy_hcd [ 1179.141793][T20039] team425: Port device gre352 added [ 1179.148616][T20040] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1179.190781][T20040] team429: entered promiscuous mode [ 1179.196238][T20040] 8021q: adding VLAN 0 to HW filter on device team429 [ 1179.219451][T20041] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1179.237205][T20041] team421: entered promiscuous mode [ 1179.244061][T20041] 8021q: adding VLAN 0 to HW filter on device team421 20:11:49 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x12, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:49 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0xf401, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:49 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x10a, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:49 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe6620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1179.333539][T20058] loop0: detected capacity change from 0 to 24 [ 1179.346150][T20058] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1179.358046][T20058] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1179.486986][T20033] gre355: entered promiscuous mode [ 1179.494196][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1179.506766][T20033] team429: Port device gre355 added [ 1179.512504][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1179.537417][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1179.557476][T12655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1179.567197][T12655] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1179.607556][T12655] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1179.616669][T12655] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1179.638855][T12655] usb 5-1: config 0 descriptor?? [ 1179.698801][T20060] team426: entered promiscuous mode [ 1179.704248][T20060] 8021q: adding VLAN 0 to HW filter on device team426 [ 1179.728323][T20061] team422: entered promiscuous mode [ 1179.733842][T20061] 8021q: adding VLAN 0 to HW filter on device team422 [ 1179.872990][T20062] gre353: entered promiscuous mode [ 1179.888808][T20062] team426: Port device gre353 added [ 1179.895666][T20064] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1179.937194][T20064] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1180.177379][T12655] usbhid 5-1:0.0: can't add hid device: -71 [ 1180.183429][T12655] usbhid: probe of 5-1:0.0 failed with error -71 [ 1180.195274][T12655] usb 5-1: USB disconnect, device number 94 20:11:50 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r1, 0x82, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) (async) syz_usb_control_io$hid(r0, 0x0, 0x0) (async) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) (async) syz_usb_ep_write$ath9k_ep1(r1, 0x82, 0x0, 0x0) (async) syz_usb_control_io(r1, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) 20:11:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0xffe5, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:50 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x10b, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:50 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xfffff000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:50 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x17, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:50 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe7620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:51 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x21, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1180.630583][T20070] __nla_validate_parse: 2 callbacks suppressed [ 1180.630598][T20070] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1180.655595][T20070] team423: entered promiscuous mode [ 1180.661065][T20070] 8021q: adding VLAN 0 to HW filter on device team423 [ 1180.706327][T20072] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1180.706795][T20073] loop0: detected capacity change from 0 to 24 20:11:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:51 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x10c, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1180.755847][T20073] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1180.760690][T20072] team430: entered promiscuous mode [ 1180.769184][T20073] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1180.795964][T20072] 8021q: adding VLAN 0 to HW filter on device team430 20:11:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x2, 0x5, 0x10}}}}}}, 0x0) [ 1180.826944][T20082] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:11:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x3, 0x5, 0x10}}}}}}, 0x0) [ 1180.869123][T20082] team427: entered promiscuous mode [ 1180.874700][T20082] 8021q: adding VLAN 0 to HW filter on device team427 [ 1180.893308][T20089] loop0: detected capacity change from 0 to 24 [ 1180.916420][T20089] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1180.928667][T20089] romfs: Mounting image 'rom 637cf1fa' through the block layer [ 1181.017612][T15110] usb 5-1: new high-speed USB device number 95 using dummy_hcd [ 1181.082643][T20081] gre356: entered promiscuous mode [ 1181.106336][T20081] team430: Port device gre356 added [ 1181.113429][T20085] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1181.135772][T20085] team424: entered promiscuous mode [ 1181.144403][T20085] 8021q: adding VLAN 0 to HW filter on device team424 [ 1181.298675][T20074] gre354: entered promiscuous mode [ 1181.307024][T20074] team427: Port device gre354 added [ 1181.387785][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1181.404404][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1181.415001][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1181.430517][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1181.440775][T15110] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1181.459582][T15110] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1181.468778][T15110] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1181.478307][T15110] usb 5-1: config 0 descriptor?? 20:11:52 executing program 4: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x78, r0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x64010100}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3a}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6gretap0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000240)={0x2c, &(0x7f0000000200)=ANY=[@ANYBLOB="fde013747969ba8cf57262ff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:11:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x4, 0x5, 0x10}}}}}}, 0x0) 20:11:52 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x1b0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:52 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xffffff7f, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:52 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x25, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:52 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe8620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1181.941309][T20079] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1181.950002][T20079] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1181.963262][T20079] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1181.973091][T20079] misc raw-gadget: fail, usb_gadget_register_driver returned -16 20:11:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x5, 0x5, 0x10}}}}}}, 0x0) [ 1182.011310][T20101] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1182.031443][T20099] loop0: detected capacity change from 0 to 24 [ 1182.043041][T20101] team431: entered promiscuous mode 20:11:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x10}}}}}}, 0x0) [ 1182.058736][T20101] 8021q: adding VLAN 0 to HW filter on device team431 [ 1182.072554][T15110] usbhid 5-1:0.0: can't add hid device: -71 [ 1182.078839][T15110] usbhid: probe of 5-1:0.0 failed with error -71 20:11:52 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x23e, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1182.120229][T20111] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1182.133804][T15110] usb 5-1: USB disconnect, device number 95 20:11:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x7, 0x5, 0x10}}}}}}, 0x0) 20:11:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x4, 0x10}}}}}}, 0x0) 20:11:52 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x266, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1182.186390][T20116] loop0: detected capacity change from 0 to 24 [ 1182.200669][T20111] team428: entered promiscuous mode [ 1182.209045][T20111] 8021q: adding VLAN 0 to HW filter on device team428 [ 1182.313982][T20122] loop0: detected capacity change from 0 to 24 [ 1182.467319][T20110] gre357: entered promiscuous mode [ 1182.493693][T20110] team431: Port device gre357 added [ 1182.499695][T20112] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1182.524575][T20112] team425: entered promiscuous mode [ 1182.530119][T15110] usb 5-1: new high-speed USB device number 96 using dummy_hcd [ 1182.538174][T20112] 8021q: adding VLAN 0 to HW filter on device team425 [ 1182.663725][T20104] gre355: entered promiscuous mode [ 1182.674357][T20104] team428: Port device gre355 added [ 1182.897439][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1182.917314][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1182.927078][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1182.957693][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1182.977385][T15110] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1183.007478][T15110] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1183.016570][T15110] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1183.034070][T15110] usb 5-1: config 0 descriptor?? [ 1183.777428][T15110] usbhid 5-1:0.0: can't add hid device: -71 [ 1183.783432][T15110] usbhid: probe of 5-1:0.0 failed with error -71 [ 1183.792565][T15110] usb 5-1: USB disconnect, device number 96 20:11:54 executing program 4: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x78, r0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x64010100}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3a}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6gretap0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000240)={0x2c, &(0x7f0000000200)=ANY=[@ANYBLOB="fde013747969ba8cf57262ff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0), 0xffffffffffffffff) (async) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x78, r0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x64010100}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3a}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6gretap0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) (async) syz_usb_control_io$hid(r1, 0x0, 0x0) (async) syz_usb_control_io(r1, &(0x7f0000000240)={0x2c, &(0x7f0000000200)=ANY=[@ANYBLOB="fde013747969ba8cf57262ff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) 20:11:54 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x300, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x10}}}}}}, 0x0) 20:11:54 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xffffff9e, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:54 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x2f, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:54 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xe9620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x10}}}}}}, 0x0) [ 1184.246553][T20127] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1184.257451][T20130] loop0: detected capacity change from 0 to 24 [ 1184.276055][T20130] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1184.286792][T20130] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:11:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x10}}}}}}, 0x0) 20:11:54 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x32c, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xf}}}}}}, 0x0) [ 1184.306530][T20127] team426: entered promiscuous mode [ 1184.316816][T20127] 8021q: adding VLAN 0 to HW filter on device team426 [ 1184.364671][T20128] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:11:54 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x39, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x70}}}}}}, 0x0) [ 1184.406713][T20128] team429: entered promiscuous mode [ 1184.417924][T20128] 8021q: adding VLAN 0 to HW filter on device team429 [ 1184.420059][T20146] loop0: detected capacity change from 0 to 24 [ 1184.547321][T15110] usb 5-1: new high-speed USB device number 97 using dummy_hcd [ 1184.552685][T20135] gre356: entered promiscuous mode [ 1184.565782][T20135] team429: Port device gre356 added [ 1184.572637][T20139] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1184.611083][T20139] team432: entered promiscuous mode [ 1184.616505][T20139] 8021q: adding VLAN 0 to HW filter on device team432 [ 1184.717202][T20142] gre358: entered promiscuous mode [ 1184.726763][T20142] team432: Port device gre358 added [ 1184.741235][T20151] team427: entered promiscuous mode [ 1184.746701][T20151] 8021q: adding VLAN 0 to HW filter on device team427 [ 1184.907476][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1184.919160][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1184.929935][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1184.942247][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1184.952005][T15110] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1184.964961][T15110] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1184.974088][T15110] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1184.983488][T15110] usb 5-1: config 0 descriptor?? 20:11:56 executing program 4: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x78, r0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x64010100}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3a}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6gretap0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000240)={0x2c, &(0x7f0000000200)=ANY=[@ANYBLOB="fde013747969ba8cf57262ff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0), 0xffffffffffffffff) (async) sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20020}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x78, r0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @rand_addr=0x64010100}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x3a}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6gretap0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x78}, 0x1, 0x0, 0x0, 0x40}, 0x0) (async) syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000402609333332000000000109022d00010000000009040000050301010009210000000122010009058103000000000009050203"], 0x0) (async) syz_usb_control_io$hid(r1, 0x0, 0x0) (async) syz_usb_control_io(r1, &(0x7f0000000240)={0x2c, &(0x7f0000000200)=ANY=[@ANYBLOB="fde013747969ba8cf57262ff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) 20:11:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}, 0x0) 20:11:56 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x37e, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:56 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xea030000, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:56 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xffffffc3, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:56 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x63, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1185.727524][T15110] usbhid 5-1:0.0: can't add hid device: -71 [ 1185.733545][T15110] usbhid: probe of 5-1:0.0 failed with error -71 [ 1185.741326][T20162] __nla_validate_parse: 1 callbacks suppressed [ 1185.741339][T20162] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1185.748680][T20163] loop0: detected capacity change from 0 to 24 20:11:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x2}}}}}}, 0x0) [ 1185.776354][T15110] usb 5-1: USB disconnect, device number 97 20:11:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x3}}}}}}, 0x0) 20:11:56 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x388, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1185.812847][T20162] team433: entered promiscuous mode [ 1185.823240][T20162] 8021q: adding VLAN 0 to HW filter on device team433 20:11:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x4}}}}}}, 0x0) 20:11:56 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x3e7, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1185.887165][T20176] loop0: detected capacity change from 0 to 24 [ 1185.904417][T20176] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 1185.913675][T20176] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:11:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x5}}}}}}, 0x0) [ 1186.010963][T20182] loop0: detected capacity change from 0 to 24 [ 1186.147464][T15110] usb 5-1: new high-speed USB device number 98 using dummy_hcd [ 1186.164237][T20168] gre359: entered promiscuous mode [ 1186.183783][T20168] team433: Port device gre359 added [ 1186.190067][T20169] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1186.224042][T20169] team428: entered promiscuous mode [ 1186.229592][T20169] 8021q: adding VLAN 0 to HW filter on device team428 [ 1186.246722][T20170] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1186.275129][T20170] team430: entered promiscuous mode [ 1186.280693][T20170] 8021q: adding VLAN 0 to HW filter on device team430 [ 1186.426380][T20175] gre357: entered promiscuous mode [ 1186.435156][T20175] team430: Port device gre357 added [ 1186.511803][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1186.523927][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1186.534987][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 1186.546157][T15110] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1186.556470][T15110] usb 5-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1186.570778][T15110] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.32 [ 1186.580034][T15110] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1186.591118][T15110] usb 5-1: config 0 descriptor?? [ 1187.269798][T20167] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1187.280117][T20167] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1187.547400][T15110] usbhid 5-1:0.0: can't add hid device: -71 [ 1187.553396][T15110] usbhid: probe of 5-1:0.0 failed with error -71 [ 1187.565129][T15110] usb 5-1: USB disconnect, device number 98 20:11:58 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYRES64], 0x0) r1 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_disconnect(r1) syz_usb_control_io$hid(r1, &(0x7f0000000d80)={0x24, &(0x7f0000000c80)={0x0, 0x2, 0x13, {0x13, 0x22, "0a09a51e3bbd0147735f8cb35290e0c29b"}}, &(0x7f0000000cc0)={0x0, 0x3, 0x4, @string={0x4, 0x3, 'qX'}}, &(0x7f0000000d00)={0x0, 0x22, 0x10, {[@main=@item_4={0x3, 0x0, 0xf, "ed2a115b"}, @global=@item_4={0x3, 0x1, 0x8, "4e2acd96"}, @global=@item_012={0x0, 0x1, 0x3}, @local=@item_4={0x3, 0x2, 0x5, "73973b47"}]}}, &(0x7f0000000d40)={0x0, 0x21, 0x9, {0x9, 0x21, 0x8001, 0x9, 0x1, {0x22, 0xc15}}}}, &(0x7f0000001040)={0x2c, &(0x7f0000000dc0)={0x40, 0x7, 0x8b, "2a8d5f825b0b088193112eb280930a422eb3e690419b62360c4e4c917f06de0a2c0cbaee0b7b562ece2d7602af1dec5ab979386d582ff2c07e69df892704cb90edd6244fcd99d68853dd8602ac3a8baefa7d01e995a3fa156fa71548ce9c01e74be0049988c7ee024cbe65a8212a86a4905792ecf5d991b51591f548b21e214e3b2dca77186d2e9d53d375"}, &(0x7f0000000e80)={0x0, 0xa, 0x1, 0x37}, &(0x7f0000000ec0)={0x0, 0x8, 0x1, 0x5}, &(0x7f0000000f00)={0x20, 0x1, 0xe5, "d9d607f4230cb589d5e7aa62c3869b04b1ef2eb52e061f3122f92eb30e4af2ccebc8d5575636b4a6298c7536dda9a1d3ecd05e81b93df07ae662406e44c07d2b1953b71dcb0a4ffc117c8e753bbaff94487aa303fe6c5fa9e1f4be9792460ac521a5fbf1d533b4b14b357d5f8972a5d82306d113915c6a8421c844e1708a041658d7e124718546cca3fac5007d53d604f5c85dcf854ae28c78da362c2f3f413f150ea2e2e7585c9eb334157550df73edccb671f1517157d27a2ae528d26464166d2aaf38a19081e1d5870e6f8771a7193e28bef23c6a03643a4cbb3ad1d8615e9954c19a19"}, &(0x7f0000001000)={0x20, 0x3, 0x1, 0x7}}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_connect$cdc_ncm(0x6, 0x7c, &(0x7f0000000880)={{0x12, 0x1, 0x110, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6a, 0x2, 0x1, 0x3, 0xd0, 0xc, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5, 0x24, 0x0, 0x712d}, {0xd, 0x24, 0xf, 0x1, 0x7, 0x8, 0x101}, {0x6, 0x24, 0x1a, 0x9, 0x20}, [@dmm={0x7, 0x24, 0x14, 0x5, 0x1}, @dmm={0x7, 0x24, 0x14, 0x3, 0x2}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x0, 0x62, 0x6a}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x3f, 0x7}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x5, 0x2, 0x8}}}}}}}]}}, &(0x7f0000000c00)={0xa, &(0x7f0000000900)={0xa, 0x6, 0x310, 0x20, 0x0, 0x20, 0x8, 0x1}, 0x19, &(0x7f0000000940)={0x5, 0xf, 0x19, 0x1, [@ss_container_id={0x14, 0x10, 0x4, 0x81, "192070acf55734d21bcf1029530bf0d4"}]}, 0x8, [{0x6d, &(0x7f0000000980)=@string={0x6d, 0x3, "ac0c72a7bbd4027f6b0f2d4c6043a5899013a8258a18fd193199a49d69542d316f4335e0199f4d4d09d2175b5d3d66390f8a03fe0a09bbe241eceaeaa60e6564985d6b46e4d435c5539a7342b9f459a987ee186a76a3d47fc1616f05aca6cbdab5864441491965062f6955"}}, {0x9, &(0x7f0000000a00)=@string={0x9, 0x3, "2d3ffaf398c6c5"}}, {0x23, &(0x7f0000000a40)=@string={0x23, 0x3, "b02a626652c7114ae5a994d3cba07ac3805f096532cb5273a6a94ad9482b70b301"}}, {0x4, &(0x7f0000000a80)=@lang_id={0x4, 0x3, 0xf8ff}}, {0x2f, &(0x7f0000000ac0)=@string={0x2f, 0x3, "9b3793682cb429718e37a97023c627b38cede22349e459335a43bad2fa2d051ac54ce6bedef6c1057369627eff"}}, {0x4, &(0x7f0000000b00)=@lang_id={0x4, 0x3, 0x41e}}, {0x4, &(0x7f0000000b40)=@lang_id={0x4, 0x3, 0x1409}}, {0x73, &(0x7f0000000b80)=@string={0x73, 0x3, "d1226973605b8d5227279022c4438afdf641fb29ff765baea73a203f94a7b6f3988a11e924d63324a3d40eef6731393fb6e9c6c700bb2151d1b24fe37f6e8413977429b3e64da043f5b42f8ecfd428a0133e4d097bf6eca3060c5ea2e10ae21bbea9df86e7ee270ade159014a997171e54"}}]}) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f00000000c0)=ANY=[@ANYBLOB="20313f0000003fc50170f70ddf3f1474c5bcc7f97bd2f19489f3eb298335050eade43f6b6edd22d8a8ebb73d72ea0d5bc6fb63d02ab2cafb5bd07c091d60edba9582a4ce75"], &(0x7f0000000140)={0x0, 0x3, 0xe2, @string={0xe2, 0x3, "ef5e84eb74f1694cb63d2aa74008fd0c667fac9b3a801149eba6267e600a2a4a5d0150d6f2b734c7b3e6595459ae14df6753b677cf898fdb8de703b8842362666892ef971352f7f08b4cb5a5a49ee165af6714487a9cd22d17c821c01238bf2da69d934e21ab8efec444b0f576a4b66ae3183b24a697ae7a2bd88ef4e8f6eac7057c0167cf78504c4a212568226df7a53281a48c8fec3cf35381fc32142edaf042f7382789c2957834f2a85aa6f0acb12aacb1defc0dc0bcb5db827fd4014a2fbcca6c17ee84c38f9ff9adaefdef5affb6dfde749913d82c02d25184aa7fbbf4"}}, &(0x7f0000000040)={0x0, 0xf, 0x19, {0x5, 0xf, 0x19, 0x3, [@ext_cap={0x7, 0x10, 0x2, 0x2, 0xe, 0x4, 0x3}, @ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0xc0, 0x4, 0x5}]}}, &(0x7f0000000280)={0x20, 0x29, 0xf, {0xf, 0x29, 0x0, 0x4, 0x6, 0x81, "d9a95217", "a11d5bbc"}}, &(0x7f00000002c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x6, 0x3, 0x9, 0x2, 0xff, 0x4}}}, &(0x7f00000007c0)={0x84, &(0x7f0000000340)={0x20, 0xc, 0x97, "390746fa76f1bc84a60f7794d64cf2a57fcb0385df987df9386fed72c0dbeb3ca69242f2562533e548b07f1cb8a553b2dced9d7e7ed388fff3f0b20b645498b64340a07e65cb05bbbc6df92a8c173b4e7941748e993285e60e54e3e7f740cd8b1ed01c774b191f3ab44d3890f6b30ddd638829da530e36a87cc01c8c0735cd2e77046ced1351d2ccb93f764bbb3e36742e56167f8d05a4"}, &(0x7f0000000400)={0x0, 0xa, 0x1}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000480)={0x20, 0x0, 0x4, {0x3}}, &(0x7f00000004c0)={0x20, 0x0, 0x8, {0x208, 0x8, [0x1ef0]}}, &(0x7f0000000500)={0x40, 0x7, 0x2, 0x5}, &(0x7f0000000540)={0x40, 0x9, 0x1, 0x1}, &(0x7f0000000580)={0x40, 0xb, 0x2, "c9a5"}, &(0x7f00000005c0)={0x40, 0xf, 0x2, 0x4}, &(0x7f0000000600)={0x40, 0x13, 0x6, @broadcast}, &(0x7f0000000640)={0x40, 0x17, 0x6, @multicast}, &(0x7f0000000680)={0x40, 0x19, 0x2, "b02c"}, &(0x7f00000006c0)={0x40, 0x1a, 0x2, 0x400}, &(0x7f0000000700)={0x40, 0x1c, 0x1, 0x7}, &(0x7f0000000740)={0x40, 0x1e, 0x1, 0x4}, &(0x7f0000000780)={0x40, 0x21, 0x1, 0x7}}) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:11:58 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xea620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x6}}}}}}, 0x0) 20:11:58 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x3e8, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:11:58 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xffffffe4, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:58 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x7b, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x7}}}}}}, 0x0) [ 1188.065898][T20194] loop0: detected capacity change from 0 to 24 [ 1188.070000][T20195] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:11:58 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x3e9, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") [ 1188.113622][T20195] team429: entered promiscuous mode 20:11:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x8}}}}}}, 0x0) [ 1188.147832][T20195] 8021q: adding VLAN 0 to HW filter on device team429 20:11:58 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x7c6, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:11:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0xa}}}}}}, 0x0) 20:11:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0xe}}}}}}, 0x0) [ 1188.190763][T20201] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1188.218039][T20209] loop0: detected capacity change from 0 to 24 [ 1188.259343][T20201] team434: entered promiscuous mode [ 1188.265072][T20201] 8021q: adding VLAN 0 to HW filter on device team434 [ 1188.325107][T20202] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1188.345991][T20202] team431: entered promiscuous mode [ 1188.353062][T20202] 8021q: adding VLAN 0 to HW filter on device team431 [ 1188.368741][T15110] usb 5-1: new high-speed USB device number 99 using dummy_hcd [ 1188.470631][T20204] gre360: entered promiscuous mode [ 1188.485917][T20204] team434: Port device gre360 added [ 1188.559083][T15110] usb 5-1: device descriptor read/64, error 18 [ 1188.651014][T20205] gre358: entered promiscuous mode [ 1188.660358][T20205] team431: Port device gre358 added [ 1188.666519][T20216] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1188.694818][T20216] team430: entered promiscuous mode [ 1188.707659][T20216] 8021q: adding VLAN 0 to HW filter on device team430 [ 1188.827434][T15110] usb 5-1: new high-speed USB device number 100 using dummy_hcd [ 1189.017475][T15110] usb 5-1: device descriptor read/64, error 18 [ 1189.138133][T15110] usb usb5-port1: attempt power cycle [ 1189.547497][T15110] usb 5-1: new high-speed USB device number 101 using dummy_hcd [ 1189.717584][T15110] usb 5-1: device descriptor read/8, error -61 [ 1189.988005][T15110] usb 5-1: new high-speed USB device number 102 using dummy_hcd [ 1190.187502][T15110] usb 5-1: device descriptor read/8, error -61 [ 1190.308172][T15110] usb usb5-port1: unable to enumerate USB device 20:12:01 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000080)=ANY=[@ANYRES64], 0x0) r1 = syz_usb_connect(0x0, 0x2d, &(0x7f0000001900)=ANY=[], 0x0) syz_usb_control_io(r1, 0x0, 0x0) (async) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_disconnect(r1) (async) syz_usb_disconnect(r1) syz_usb_control_io$hid(r1, &(0x7f0000000d80)={0x24, &(0x7f0000000c80)={0x0, 0x2, 0x13, {0x13, 0x22, "0a09a51e3bbd0147735f8cb35290e0c29b"}}, &(0x7f0000000cc0)={0x0, 0x3, 0x4, @string={0x4, 0x3, 'qX'}}, &(0x7f0000000d00)={0x0, 0x22, 0x10, {[@main=@item_4={0x3, 0x0, 0xf, "ed2a115b"}, @global=@item_4={0x3, 0x1, 0x8, "4e2acd96"}, @global=@item_012={0x0, 0x1, 0x3}, @local=@item_4={0x3, 0x2, 0x5, "73973b47"}]}}, &(0x7f0000000d40)={0x0, 0x21, 0x9, {0x9, 0x21, 0x8001, 0x9, 0x1, {0x22, 0xc15}}}}, &(0x7f0000001040)={0x2c, &(0x7f0000000dc0)={0x40, 0x7, 0x8b, "2a8d5f825b0b088193112eb280930a422eb3e690419b62360c4e4c917f06de0a2c0cbaee0b7b562ece2d7602af1dec5ab979386d582ff2c07e69df892704cb90edd6244fcd99d68853dd8602ac3a8baefa7d01e995a3fa156fa71548ce9c01e74be0049988c7ee024cbe65a8212a86a4905792ecf5d991b51591f548b21e214e3b2dca77186d2e9d53d375"}, &(0x7f0000000e80)={0x0, 0xa, 0x1, 0x37}, &(0x7f0000000ec0)={0x0, 0x8, 0x1, 0x5}, &(0x7f0000000f00)={0x20, 0x1, 0xe5, "d9d607f4230cb589d5e7aa62c3869b04b1ef2eb52e061f3122f92eb30e4af2ccebc8d5575636b4a6298c7536dda9a1d3ecd05e81b93df07ae662406e44c07d2b1953b71dcb0a4ffc117c8e753bbaff94487aa303fe6c5fa9e1f4be9792460ac521a5fbf1d533b4b14b357d5f8972a5d82306d113915c6a8421c844e1708a041658d7e124718546cca3fac5007d53d604f5c85dcf854ae28c78da362c2f3f413f150ea2e2e7585c9eb334157550df73edccb671f1517157d27a2ae528d26464166d2aaf38a19081e1d5870e6f8771a7193e28bef23c6a03643a4cbb3ad1d8615e9954c19a19"}, &(0x7f0000001000)={0x20, 0x3, 0x1, 0x7}}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_connect$cdc_ncm(0x6, 0x7c, &(0x7f0000000880)={{0x12, 0x1, 0x110, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6a, 0x2, 0x1, 0x3, 0xd0, 0xc, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5, 0x24, 0x0, 0x712d}, {0xd, 0x24, 0xf, 0x1, 0x7, 0x8, 0x101}, {0x6, 0x24, 0x1a, 0x9, 0x20}, [@dmm={0x7, 0x24, 0x14, 0x5, 0x1}, @dmm={0x7, 0x24, 0x14, 0x3, 0x2}]}, {{0x9, 0x5, 0x81, 0x3, 0x40, 0x0, 0x62, 0x6a}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x3f, 0x7}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x5, 0x2, 0x8}}}}}}}]}}, &(0x7f0000000c00)={0xa, &(0x7f0000000900)={0xa, 0x6, 0x310, 0x20, 0x0, 0x20, 0x8, 0x1}, 0x19, &(0x7f0000000940)={0x5, 0xf, 0x19, 0x1, [@ss_container_id={0x14, 0x10, 0x4, 0x81, "192070acf55734d21bcf1029530bf0d4"}]}, 0x8, [{0x6d, &(0x7f0000000980)=@string={0x6d, 0x3, "ac0c72a7bbd4027f6b0f2d4c6043a5899013a8258a18fd193199a49d69542d316f4335e0199f4d4d09d2175b5d3d66390f8a03fe0a09bbe241eceaeaa60e6564985d6b46e4d435c5539a7342b9f459a987ee186a76a3d47fc1616f05aca6cbdab5864441491965062f6955"}}, {0x9, &(0x7f0000000a00)=@string={0x9, 0x3, "2d3ffaf398c6c5"}}, {0x23, &(0x7f0000000a40)=@string={0x23, 0x3, "b02a626652c7114ae5a994d3cba07ac3805f096532cb5273a6a94ad9482b70b301"}}, {0x4, &(0x7f0000000a80)=@lang_id={0x4, 0x3, 0xf8ff}}, {0x2f, &(0x7f0000000ac0)=@string={0x2f, 0x3, "9b3793682cb429718e37a97023c627b38cede22349e459335a43bad2fa2d051ac54ce6bedef6c1057369627eff"}}, {0x4, &(0x7f0000000b00)=@lang_id={0x4, 0x3, 0x41e}}, {0x4, &(0x7f0000000b40)=@lang_id={0x4, 0x3, 0x1409}}, {0x73, &(0x7f0000000b80)=@string={0x73, 0x3, "d1226973605b8d5227279022c4438afdf641fb29ff765baea73a203f94a7b6f3988a11e924d63324a3d40eef6731393fb6e9c6c700bb2151d1b24fe37f6e8413977429b3e64da043f5b42f8ecfd428a0133e4d097bf6eca3060c5ea2e10ae21bbea9df86e7ee270ade159014a997171e54"}}]}) syz_usb_control_io(r0, &(0x7f0000000300)={0x2c, &(0x7f00000000c0)=ANY=[@ANYBLOB="20313f0000003fc50170f70ddf3f1474c5bcc7f97bd2f19489f3eb298335050eade43f6b6edd22d8a8ebb73d72ea0d5bc6fb63d02ab2cafb5bd07c091d60edba9582a4ce75"], &(0x7f0000000140)={0x0, 0x3, 0xe2, @string={0xe2, 0x3, "ef5e84eb74f1694cb63d2aa74008fd0c667fac9b3a801149eba6267e600a2a4a5d0150d6f2b734c7b3e6595459ae14df6753b677cf898fdb8de703b8842362666892ef971352f7f08b4cb5a5a49ee165af6714487a9cd22d17c821c01238bf2da69d934e21ab8efec444b0f576a4b66ae3183b24a697ae7a2bd88ef4e8f6eac7057c0167cf78504c4a212568226df7a53281a48c8fec3cf35381fc32142edaf042f7382789c2957834f2a85aa6f0acb12aacb1defc0dc0bcb5db827fd4014a2fbcca6c17ee84c38f9ff9adaefdef5affb6dfde749913d82c02d25184aa7fbbf4"}}, &(0x7f0000000040)={0x0, 0xf, 0x19, {0x5, 0xf, 0x19, 0x3, [@ext_cap={0x7, 0x10, 0x2, 0x2, 0xe, 0x4, 0x3}, @ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0xc0, 0x4, 0x5}]}}, &(0x7f0000000280)={0x20, 0x29, 0xf, {0xf, 0x29, 0x0, 0x4, 0x6, 0x81, "d9a95217", "a11d5bbc"}}, &(0x7f00000002c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x6, 0x3, 0x9, 0x2, 0xff, 0x4}}}, &(0x7f00000007c0)={0x84, &(0x7f0000000340)={0x20, 0xc, 0x97, "390746fa76f1bc84a60f7794d64cf2a57fcb0385df987df9386fed72c0dbeb3ca69242f2562533e548b07f1cb8a553b2dced9d7e7ed388fff3f0b20b645498b64340a07e65cb05bbbc6df92a8c173b4e7941748e993285e60e54e3e7f740cd8b1ed01c774b191f3ab44d3890f6b30ddd638829da530e36a87cc01c8c0735cd2e77046ced1351d2ccb93f764bbb3e36742e56167f8d05a4"}, &(0x7f0000000400)={0x0, 0xa, 0x1}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0x2}, &(0x7f0000000480)={0x20, 0x0, 0x4, {0x3}}, &(0x7f00000004c0)={0x20, 0x0, 0x8, {0x208, 0x8, [0x1ef0]}}, &(0x7f0000000500)={0x40, 0x7, 0x2, 0x5}, &(0x7f0000000540)={0x40, 0x9, 0x1, 0x1}, &(0x7f0000000580)={0x40, 0xb, 0x2, "c9a5"}, &(0x7f00000005c0)={0x40, 0xf, 0x2, 0x4}, &(0x7f0000000600)={0x40, 0x13, 0x6, @broadcast}, &(0x7f0000000640)={0x40, 0x17, 0x6, @multicast}, &(0x7f0000000680)={0x40, 0x19, 0x2, "b02c"}, &(0x7f00000006c0)={0x40, 0x1a, 0x2, 0x400}, &(0x7f0000000700)={0x40, 0x1c, 0x1, 0x7}, &(0x7f0000000740)={0x40, 0x1e, 0x1, 0x4}, &(0x7f0000000780)={0x40, 0x21, 0x1, 0x7}}) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) (async) syz_usb_control_io(r0, &(0x7f0000000240)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="fdff01"], 0x0, 0x0, 0x0, 0x0}, 0x0) 20:12:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x11}}}}}}, 0x0) 20:12:01 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x3fe, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:12:01 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xfffffff0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:12:01 executing program 5: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0xeb620400, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:12:01 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x402, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) 20:12:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x14}}}}}}, 0x0) [ 1191.110207][T20223] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1191.123989][T20227] loop0: detected capacity change from 0 to 24 [ 1191.134140][T20223] team431: entered promiscuous mode [ 1191.139745][T20223] 8021q: adding VLAN 0 to HW filter on device team431 20:12:01 executing program 0: syz_mount_image$romfs(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x500, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRES16=0x0, @ANYRES8], 0x1, 0x160, &(0x7f0000004400)="$eJzs2r9Kw1AUBvAjLQodHV0sVKKgbf5pXXUUN98gtLlp8MaURJB2chMnQeE6+BKKT+AjZHTTRcSXiMRcapuozSCNwvdb+tFzk9ycwJ1OM/A9nYVNoo3+5cHLYuB79ba53WE6syi1R0T1JERxfN2inKdRPYqp9cWCcq28pb+NNUfsnzOX20bZWwIAAAAAAAAAAAAAAAAAAAAAgIKUmgy1nvDOmMttfawaDoaHFud2EGavq8xui6VS6nKGi5jgN0l/zIn6+vI8KTtJcsVukNS1yeuvZFjtCf6c7a967PXVcDBsup7l2I59ZBhmW9vUtC1D/biXmr2jciv3RFF8r+XHyZSxebPHIvNm8vtXl1xxcZJ92uf3R/gmEBVd7DtpU/OluSpRkWfdEVG+9Fp+ExB+JVSnrqnQH9nq1HPlXzgdnX/UXTAbD8n51+r4vCv/nEU7S3x9APjBewAAAP//bM0zUA==") 20:12:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x28}}}}}}, 0x0) 20:12:01 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="440100001000010477ca7531573fc400925e4a44", @ANYRES32, @ANYBLOB="0d01140000000000240012000c00040062720064676500000c0002f60800000001080000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000050700ffffd87f00020000000000", @ANYRES32=r1], 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newlink={0x40, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r4}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x40}}, 0x0) [ 1191.176186][T20230] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1191.253318][T20230] team435: entered promiscuous mode [ 1191.254215][T20236] loop0: detected capacity change from 0 to 24 [ 1191.258888][T20230] 8021q: adding VLAN 0 to HW filter on device team435 [ 1191.268875][T20231] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1191.285688][T20236] MTD: Attempt to mount non-MTD device "/dev/loop0" 20:12:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x36}}}}}}, 0x0) [ 1191.300567][T20236] romfs: Mounting image 'rom 637cf1fa' through the block layer 20:12:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @empty, @empty}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0x60}}}}}}, 0x0) [ 1191.339920][T20231] team432: entered promiscuous mode [ 1191.361056][T20231] 8021q: adding VLAN 0 to HW filter on device team432 [ 1191.533347][ T6580] usb 5-1: new high-speed USB device number 103 using dummy_hcd [ 1191.577331][T20224] gre359: entered promiscuous mode [ 1191.598524][T20224] team432: Port device gre359 added [ 1191.743552][T20225] gre361: entered promiscuous mode