[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 85.568755][ T31] audit: type=1800 audit(1571642621.611:25): pid=12292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 85.591650][ T31] audit: type=1800 audit(1571642621.631:26): pid=12292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 85.626912][ T31] audit: type=1800 audit(1571642621.661:27): pid=12292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.20' (ECDSA) to the list of known hosts. 2019/10/21 07:23:54 fuzzer started 2019/10/21 07:23:58 dialing manager at 10.128.0.26:44701 2019/10/21 07:23:59 syscalls: 2415 2019/10/21 07:23:59 code coverage: enabled 2019/10/21 07:23:59 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/10/21 07:23:59 extra coverage: enabled 2019/10/21 07:23:59 setuid sandbox: enabled 2019/10/21 07:23:59 namespace sandbox: enabled 2019/10/21 07:23:59 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/21 07:23:59 fault injection: enabled 2019/10/21 07:23:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/21 07:23:59 net packet injection: enabled 2019/10/21 07:23:59 net device setup: enabled 2019/10/21 07:23:59 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 07:28:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000002e000000df000000000000009500140900000000b1d8be4c8c0cbb0d0f2500ce7717395c2de1eb092afc8c1bb98d4f86ca748fea3cb8c97d0000159a3c9b149c6063f06c8b3e3c156753c1f35ae395148c37944691cb9bf606b7c5bb4cf1543bff075da92cd2415246de7c3776c21b3a448015eb633d70861b30485507bb88b5a3211e2117e99df200390029fee2d9febdaedd0d874b4883fdd1f316ca165f58fa8f100e104ceba5f722988f3d0b017e59df34606b8c5c305e0fbc708ee460220a1c30b1999012f1ad666a8102b9a46883725ec425a41927ece9c4965cfe81df079db7e24d3d165fcc"], &(0x7f0000000180)='GPL\x00'}, 0x48) syzkaller login: [ 350.847084][T12458] IPVS: ftp: loaded support on port[0] = 21 [ 351.003157][T12458] chnl_net:caif_netlink_parms(): no params data found [ 351.062211][T12458] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.069429][T12458] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.078370][T12458] device bridge_slave_0 entered promiscuous mode [ 351.089609][T12458] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.096843][T12458] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.105697][T12458] device bridge_slave_1 entered promiscuous mode [ 351.140000][T12458] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 351.152838][T12458] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 351.187353][T12458] team0: Port device team_slave_0 added [ 351.196687][T12458] team0: Port device team_slave_1 added [ 351.337014][T12458] device hsr_slave_0 entered promiscuous mode [ 351.593128][T12458] device hsr_slave_1 entered promiscuous mode [ 351.893824][T12458] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.901099][T12458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.908972][T12458] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.916225][T12458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.999496][T12458] 8021q: adding VLAN 0 to HW filter on device bond0 [ 352.017759][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.027985][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.039736][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 352.060958][T12458] 8021q: adding VLAN 0 to HW filter on device team0 [ 352.068701][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 352.077157][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.092190][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 352.101664][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.111085][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.118327][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.163418][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 352.172729][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 352.181859][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.189128][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.199216][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 352.209350][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 352.219250][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 352.229118][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 352.238698][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 352.248549][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 352.258108][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 352.267340][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 352.276405][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 352.285620][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 352.298417][T12458] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 352.307128][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 352.352211][T12458] 8021q: adding VLAN 0 to HW filter on device batadv0 07:28:08 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x300) recvmsg(r1, &(0x7f000000cd00)={0x0, 0x0, 0x0}, 0x0) [ 352.632920][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 352.639164][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:28:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @remote}, {0x0, @dev}, 0x8, {0x2, 0x0, @multicast2}, 'lo\x00'}) 07:28:08 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) getpid() write$UHID_CREATE2(r0, &(0x7f0000001700)=ANY=[@ANYBLOB="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"/526], 0x12e) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}, {0x0}], 0x2) read(r0, &(0x7f0000000400)=""/141, 0x8d) write$UHID_DESTROY(r0, &(0x7f0000000280), 0xfed0) [ 352.910411][ T30] hid-generic 0000:0000:0000.0001: ignoring exceeding usage max [ 352.953387][ T30] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on sz1 [ 353.012718][T12460] hid-generic 0000:0000:0000.0002: ignoring exceeding usage max [ 353.048870][T12460] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on sz1 07:28:09 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) syz_open_dev$video4linux(&(0x7f0000000240)='/dev/v4l-subdev#\x00', 0x90a9, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x2, 0x0, 0x0, 0xe1) [ 353.170975][T12481] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 07:28:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, &(0x7f0000001b80)) 07:28:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, &(0x7f0000001b80)) 07:28:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, &(0x7f0000001b80)) 07:28:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, &(0x7f0000001b80)) 07:28:09 executing program 0: fstat(0xffffffffffffffff, &(0x7f0000001b80)) 07:28:09 executing program 0: fstat(0xffffffffffffffff, &(0x7f0000001b80)) 07:28:09 executing program 0: fstat(0xffffffffffffffff, &(0x7f0000001b80)) 07:28:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000001b80)) 07:28:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000001b80)) 07:28:10 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000001b80)) 07:28:10 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000001b80)) 07:28:10 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000001b80)) 07:28:10 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000001b80)) 07:28:10 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0)=0x8001, 0x4) r1 = dup2(r0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000003180)={0x3}, 0x1) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000003240)={0x7ff, 0x7fff, 0x10001, 0xffffffff, 0x1, 0x0, 0x9, 0x6, 0x0}, &(0x7f0000003280)=0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000032c0)=@assoc_value={r2, 0x2}, &(0x7f0000003300)=0x8) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000003340)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000003380)='/dev/dsp#\x00', 0x1, 0x10000) ioctl$IMDELTIMER(r5, 0x80044941, &(0x7f00000033c0)) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000003400)="f3ec0d231a6fac5364d0b82416d117a644f37b78c11d48fa5b398adb1d84d5139d87ef713ab11dd9878878271f3638e1272e2c582b9b8eb430a26d79acc73834da", 0x41) clock_nanosleep(0x6, 0x0, &(0x7f0000003480), &(0x7f00000034c0)) r6 = syz_genetlink_get_family_id$team(&(0x7f0000003540)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003640)={'yam0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003680)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000003780)=0xe8) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000037c0)={'caif0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r5, &(0x7f0000003b40)={&(0x7f0000003500)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000003b00)={&(0x7f0000003800)={0x2d4, r6, 0x4, 0x70bd29, 0x25dfdbfd, {}, [{{0x8, 0x1, r7}, {0x22c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xc000000}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x35071bc5}}}]}}, {{0x8, 0x1, r9}, {0x84, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffff50}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1f}}, {0x8}}}]}}]}, 0x2d4}, 0x1, 0x0, 0x0, 0x80}, 0x40040) r10 = syz_open_dev$adsp(&(0x7f0000003d00)='/dev/adsp#\x00', 0xfffffffffffffff7, 0x1c1401) dup2(r5, r10) pipe2(&(0x7f0000003d40)={0xffffffffffffffff}, 0x40000) getsockopt(r11, 0x8f, 0xfffffffb, &(0x7f0000003d80)=""/239, &(0x7f0000003e80)=0xef) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000003ec0)='/dev/sequencer2\x00', 0x2, 0x0) r12 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xffffffff) ioctl$KDGKBDIACR(r12, 0x4b4a, &(0x7f0000003f00)=""/133) r13 = syz_open_dev$amidi(&(0x7f0000003fc0)='/dev/amidi#\x00', 0xe4ee, 0x12b642) ioctl$DRM_IOCTL_AGP_RELEASE(r13, 0x6431) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r10, 0x84, 0xa, &(0x7f0000004000)={0x66, 0x9, 0x408, 0x5d32, 0xfff, 0xfff, 0xffff, 0x0, r3}, 0x20) read(r4, &(0x7f0000004040)=""/190, 0xbe) r14 = syz_open_dev$vcsn(&(0x7f0000004100)='/dev/vcs#\x00', 0x7ff, 0x0) ioctl$KIOCSOUND(r14, 0x4b2f, 0x8) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000004140)) 07:28:10 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, 0x0) 07:28:10 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, 0x0) 07:28:10 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, 0x0) 07:28:10 executing program 0 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, &(0x7f0000001b80)) [ 354.807280][T12531] IPVS: ftp: loaded support on port[0] = 21 [ 355.019239][T12531] chnl_net:caif_netlink_parms(): no params data found [ 355.077828][T12531] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.085119][T12531] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.093799][T12531] device bridge_slave_0 entered promiscuous mode [ 355.105187][T12531] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.112430][T12531] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.121057][T12531] device bridge_slave_1 entered promiscuous mode [ 355.166881][T12531] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 355.187981][T12531] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 355.246055][T12531] team0: Port device team_slave_0 added [ 355.255557][T12531] team0: Port device team_slave_1 added [ 355.328647][T12531] device hsr_slave_0 entered promiscuous mode [ 355.374228][T12531] device hsr_slave_1 entered promiscuous mode [ 355.412762][T12531] debugfs: Directory 'hsr0' with parent '/' already present! [ 355.460962][T12531] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.468340][T12531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.476138][T12531] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.483415][T12531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.621267][T12531] 8021q: adding VLAN 0 to HW filter on device bond0 [ 355.641477][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.654170][T12460] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.664241][T12460] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.678630][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 355.710896][T12531] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.737911][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 355.748317][T12460] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.755745][T12460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.794419][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 355.803738][T12460] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.810903][T12460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.854334][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 355.864935][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 355.902305][T12531] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 355.913519][T12531] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 355.927741][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 355.937038][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 355.946736][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.988067][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 356.019460][T12531] 8021q: adding VLAN 0 to HW filter on device batadv0 07:28:12 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000ff2a78e01816139161df00000009090212000800000000090400000013e5ee00140aafe04dc0ce61015b21971995848bf23bf765ca39f3febe4780948c707f8e0f76bde55b9734bf0806059b61040a94cbf053ff9431fba6b2cdccdacd530d441c2405e0d137f75e082c0ee99d096342d70f95a169d2a3e96c43c5268e2dd69da167acd3485bdf1ab5bf75e0ed463613680d"], 0x0) [ 356.823846][ T12] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 357.134452][ T12] usb 2-1: device descriptor read/64, error 18 [ 357.534104][ T12] usb 2-1: device descriptor read/64, error 18 [ 357.802133][ T12] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 358.072099][ T12] usb 2-1: device descriptor read/64, error 18 [ 358.502841][ T12] usb 2-1: device descriptor read/64, error 18 [ 358.636051][ T12] usb usb2-port1: attempt power cycle [ 359.362312][ T12] usb 2-1: new high-speed USB device number 4 using dummy_hcd 07:28:15 executing program 1: set_mempolicy(0x1, 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ion\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0xde744ab8d5343d5c, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000700000004000000a8040000800200000000000080020000c0030000c0030000c003000004000000", @ANYPTR=&(0x7f0000000740)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c201346c2d5323aa0000000000"], @ANYBLOB="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"], 0x4f8) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r0, 0x4010ae68, &(0x7f0000000100)={0x100000, 0x2000}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000680)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000640)={0xa, 0x4e21, 0x5, @loopback, 0x8001}, 0x1c) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000080)={0x3, "0394b730e0defeefe0546957885a3c51af59a6bb1f475b3f3d98e6c1e73a2a1c", 0x0, 0x1}) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0xffd, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_DISCONNECT(r2, 0xab08) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="ba", 0x1}], 0x1, 0x0) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000700)) 07:28:16 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r2, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) fstat(r0, &(0x7f00000002c0)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000140)="ba", 0x1}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000140)="ba", 0x1}], 0x1, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r4, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, r7}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000040)={r8, 0x0, r0}) [ 360.248609][T12557] bond0: (slave bond_slave_1): Releasing backup interface 07:28:16 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10040, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) socketpair(0x8, 0x4, 0x3, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000140)={r3, 0x401}, &(0x7f0000000180)=0x8) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) getresgid(&(0x7f0000000440)=0x0, &(0x7f0000000480), &(0x7f00000004c0)) getgroups(0x2, &(0x7f0000000500)=[0xee01, 0xee01]) setxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {0x1, 0x40288bdabaa20bae}, [{0x2, 0x2, r4}, {0x2, 0x4}, {0x2, 0x4, r5}], {}, [{0x8, 0x0, r6}, {0x8, 0xddb4ca0cd2ad91cc, r7}], {0x10, 0xf7634488f577134c}, {0x20, 0x4}}, 0x4c, 0x2) r8 = accept4(0xffffffffffffffff, &(0x7f00000005c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000640)=0x80, 0x800) fcntl$getflags(r8, 0xb) recvfrom$packet(r8, &(0x7f0000000680), 0x0, 0x80, 0x0, 0x0) fsetxattr$security_smack_entry(r8, &(0x7f00000006c0)='security.SMACK64IPIN\x00', &(0x7f0000000700)='/dev/btrfs-control\x00', 0x13, 0x7) r9 = syz_open_dev$dspn(&(0x7f0000000740)='/dev/dsp#\x00', 0x80, 0x10000) getsockopt$inet6_udp_int(r9, 0x11, 0xa, &(0x7f0000000780), &(0x7f00000007c0)=0x4) getpeername$tipc(r8, &(0x7f0000000800)=@name, &(0x7f0000000840)=0x10) r10 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$FS_IOC_GETVERSION(r10, 0x80087601, &(0x7f00000008c0)) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000900)="da10569c55da17e5328d317eb8fac71e3112dcd15692b9c34509c88fc9e300be9c824bf34aec00e504b53e77a967a75ffe5bb454f91318a91b19dfc17c2a8680c5ad55f2ee1a83a979506d7b7d489d7cbefb7d1154f3f601f8be963654d2a4726fbfa87e3ea2af8cb1d0d47dabe7abfb53596f290765d4213d595660ce312ea9ce3e8d877260acba4475a1267c28b71ad5006cd5c151ee0e98a7140eba3d634a5d3f5a9a463d4b4147906d33b10d64810c5affa54bb90b3338d4c478d94d267a30e1058bc748dc4b8bf27f80d70eb30c43a981301493ae42df01d7ea3f8acc503f2bddecd825c96bec8618fe99bf5e0c00fcdc983f", 0xf5) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x20800, 0x0) r12 = syz_genetlink_get_family_id$fou(&(0x7f0000000a80)='fou\x00') sendmsg$FOU_CMD_GET(r11, &(0x7f0000000b80)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x20000210}, 0xc, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x60, r12, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @loopback}}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @remote}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @remote}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) r13 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000c40), 0x800) fcntl$F_GET_RW_HINT(r13, 0x40b, &(0x7f0000000c80)) r14 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r14, 0x84, 0x8, &(0x7f00000010c0)=0x9, 0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000001100)={r3}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000001180)={r15, @in6={{0xa, 0x4e20, 0x8000, @rand_addr="eb1253391f1b16ee555b443c0b574cba", 0x4}}, 0x1, 0x4, 0x3fb4, 0x56}, &(0x7f0000001240)=0x98) r16 = openat$zero(0xffffffffffffff9c, &(0x7f0000001280)='/dev/zero\x00', 0x6000, 0x0) ioctl$TIOCSCTTY(r16, 0x540e, 0x2) [ 360.530927][T12558] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 360.565751][T12559] bond0: (slave bond_slave_1): Releasing backup interface 07:28:16 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00\x00\x00\x00l\x91@]y\x00\x00\x00\x00g\xb8\xda\xc1\x84=[\x1f\r\x06\x00\x00\x00\x00\x00\x00\x00|\x88O\xbaI\xa3*@\x9e\xca\x8b\xde\xefC\xfd \xde\x9ao\xd4\xc4\xac\xb7', 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, &(0x7f00000000c0)=0x81, &(0x7f0000000100)=0x4) ftruncate(r2, 0x40000) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000240)=0x4, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendfile(r1, r2, 0x0, 0xffe4) [ 360.757680][T12560] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 360.796628][T12567] IPv4: Oversized IP packet from 127.0.0.1 07:28:16 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) fstat(r0, &(0x7f0000001b80)) [ 360.889969][T12569] IPv4: Oversized IP packet from 127.0.0.1 07:28:17 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000001c0)={'lo\x00\x00\x00\x00\x00\x00\xed\xff\xff\xff\xff\xff\xff\xff'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0x4fd}) [ 361.027279][T12574] IPVS: ftp: loaded support on port[0] = 21 07:28:17 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, &(0x7f0000001b80)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x123000, 0x0) 07:28:17 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(0xffffffffffffffff, &(0x7f0000000000)) 07:28:17 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, &(0x7f0000001b80)) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x428303) r2 = socket$inet(0x2, 0x2000080001, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) bind(r0, &(0x7f0000000180)=@tipc=@name={0x1e, 0x2, 0x2}, 0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, r4}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={r4, @in6={{0xa, 0x4e22, 0x6bfddab3, @empty, 0x1}}, 0x8000, 0x1, 0x1ff, 0x7fff, 0x4}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000140)={r5, 0x40}, 0x8) 07:28:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r3, 0x2) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000400)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eeffff34de0f000000008fda0236d33c9a38889d16d9860000000000000000396d08e75ef5dce447d9"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x21) [ 361.596283][T12574] chnl_net:caif_netlink_parms(): no params data found 07:28:17 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="ba", 0x1}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="ba", 0x1}], 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000000)={0x100000001, 0x0, 0x1, 0x6}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000040)={r2, 0xfffffffffffffffc}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') [ 361.738688][T12574] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.746110][T12574] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.754826][T12574] device bridge_slave_0 entered promiscuous mode [ 361.769292][T12574] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.777065][T12574] bridge0: port 2(bridge_slave_1) entered disabled state 07:28:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) io_setup(0x5, &(0x7f00000000c0)=0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x8800, 0x0) accept$unix(r2, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0x7ffff000}]) [ 361.785777][T12574] device bridge_slave_1 entered promiscuous mode [ 361.846273][T12574] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 361.859828][T12574] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 361.910500][T12574] team0: Port device team_slave_0 added [ 361.920163][T12574] team0: Port device team_slave_1 added [ 361.998291][T12574] device hsr_slave_0 entered promiscuous mode [ 362.052902][T12574] device hsr_slave_1 entered promiscuous mode 07:28:18 executing program 1: r0 = memfd_create(&(0x7f0000000280)='/dev/binder#\x00', 0x7) syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) pwrite64(r1, &(0x7f00000002c0)="440199d582e566f8084409e84e7dfd5a1437d23395ebc746a8ee761d14006910b9bcdb7be2d106c87d99125a0c26d488724be4d5be06afdef8fd8f8e828616db32523b1f402e4e707e68a092f8738d884d719f0f6788be447d3a6184214f5f5920e097085f81ec74a080743ba5e9608139ca84c2773af90d74a99e0b3b8a139cc3e08c1bc8c2c62ae3faa23434d26735afe3e5b3fd26db7f5134e19353d918b706465f70aaabc535f00863d718fcc29efaa3aa50a6226f4212a2cf0bbfd4b8ad6af777555355d55b7ccfdaa70deb86bfc68ce2bf62a9da15", 0xffffffffffffff9c, 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 362.184484][T12574] debugfs: Directory 'hsr0' with parent '/' already present! [ 362.242529][T12609] debugfs: File '12608' in directory 'proc' already present! [ 362.342332][T12574] 8021q: adding VLAN 0 to HW filter on device bond0 [ 362.370653][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 362.388646][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 362.397409][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.414207][T12574] 8021q: adding VLAN 0 to HW filter on device team0 [ 362.439191][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.448648][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.457978][T12460] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.465200][T12460] bridge0: port 1(bridge_slave_0) entered forwarding state 07:28:18 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x284202, 0x0) openat$cgroup_procs(r0, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="740100005e000700"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x174}}, 0x0) [ 362.518013][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 362.527180][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.536422][T12460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.545331][T12460] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.552531][T12460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.635947][T12574] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 362.646868][T12574] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 362.662681][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 362.672863][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 362.683309][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.692798][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.755725][T12574] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.788165][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 362.797906][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 07:28:19 executing program 2: syz_usb_connect(0x0, 0x10000009f, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x11, 0x9c, 0x13, 0x0, 0x257a, 0x3601, 0xfba, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x70, 0x7f, 0x8c}}]}}]}}, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 07:28:19 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') socket$xdp(0x2c, 0x3, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) fstat(r0, &(0x7f0000000080)) 07:28:19 executing program 1: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x1ff}, 0x8) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/195, 0x20010134}, {&(0x7f0000000300)=""/204, 0xcc}], 0x2) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x0) 07:28:19 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') epoll_create(0x7) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) fstat(r0, &(0x7f0000000000)) [ 363.213938][T12640] bond0: (slave bond_slave_1): Releasing backup interface 07:28:19 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#! ./file0 \t\n'], 0xd) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="ba", 0x1}], 0x1, 0x0) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x9) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 363.396433][ T12] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 363.418400][T12642] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 363.448565][T12640] bond0: (slave bond_slave_1): Releasing backup interface [ 363.568558][T12642] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:28:19 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) timerfd_gettime(r1, &(0x7f0000000040)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) fstat(r0, &(0x7f0000001b80)) 07:28:19 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000040)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x521082) connect$caif(r5, &(0x7f0000000180)=@rfm={0x25, 0x23d52658, "3030b41f69927310b38905863b380bba"}, 0x18) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) r6 = signalfd4(r4, &(0x7f0000000080)={0x81}, 0x8, 0x180000) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000100)={0x7f, &(0x7f00000000c0)=[r2, r3, r6, r1]}, 0x4) fstat(r1, &(0x7f0000001b80)) [ 363.693288][ T12] usb 3-1: device descriptor read/64, error 18 [ 363.795910][T12658] QAT: Invalid ioctl [ 363.805035][T12658] bond0: (slave bond_slave_1): Releasing backup interface [ 363.936951][T12659] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 363.957922][T12658] QAT: Invalid ioctl [ 363.967078][T12659] bond0: (slave bond_slave_1): Releasing backup interface [ 364.094151][ T12] usb 3-1: device descriptor read/64, error 18 [ 364.105389][T12658] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:28:20 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000100)={{0x2, 0x4e28, @remote}, {0x4000030000000304, @local}, 0x2, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x3) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) fstat(r0, &(0x7f0000001b80)) 07:28:20 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4142, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x6, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x5, 0x3}, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x5, 0x80, 0x8}, &(0x7f0000000140)=0x7f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x401}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r0, 0x10, &(0x7f00000002c0)={&(0x7f0000000000)=""/14, 0xe, r1}}, 0x10) 07:28:20 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, &(0x7f0000000000)) [ 364.365007][ T12] usb 3-1: new high-speed USB device number 3 using dummy_hcd 07:28:20 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) setfsgid(r1) pread64(0xffffffffffffffff, &(0x7f0000000000)=""/170, 0xaa, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="ba", 0x1}], 0x1, 0x0) r3 = accept$packet(r2, &(0x7f0000000140), &(0x7f0000000180)=0x14) ioctl(r3, 0x0, &(0x7f00000001c0)="1635") 07:28:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b40000000500000071112d00000000004600000000000000d500000000000000a1215d3ec26a23c84a2a6257d27b502b6f728bd20533c3e4b91de8be0eee072901d96f75d405f8ed9ca2e951415fe31118e3"], &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) [ 364.682269][ T12] usb 3-1: device descriptor read/64, error 18 [ 365.083302][ T12] usb 3-1: device descriptor read/64, error 18 [ 365.203642][ T12] usb usb3-port1: attempt power cycle [ 365.922157][ T12] usb 3-1: new high-speed USB device number 4 using dummy_hcd 07:28:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c00000010103b28000001000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c00020008000100", @ANYRES32=r2], 0x3c}, 0x1, 0x0, 0x0, 0x4004008}, 0x28804) 07:28:22 executing program 1: syz_usb_connect(0x2, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000db51876567673130aaf10102030109021200017d8284aef1f52a001f00000904"], 0x0) syz_usb_disconnect(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) setsockopt$inet_dccp_int(r2, 0x21, 0x6, &(0x7f0000000180)=0x1, 0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f00000001c0)) getsockopt$inet6_opts(r4, 0x29, 0x3b, &(0x7f0000000040)=""/211, &(0x7f0000000140)=0xd3) ioctl$RTC_UIE_OFF(r5, 0x7004) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:28:22 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0x9, 0x1, 0x2, 0x5, 'syz0\x00', 0x4}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) r2 = semget$private(0x0, 0x1, 0x0) semop(r2, &(0x7f0000000440)=[{0x0, 0x8001}], 0x1) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000000)=[0x7]) semop(r2, &(0x7f0000000440)=[{}], 0x1f2) semctl$IPC_RMID(r2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000140)="ba", 0x1}], 0x1, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r4, 0x8208ae63, &(0x7f0000000100)={0x1, 0x0, @ioapic={0xf000, 0x5, 0x401, 0x8d, 0x0, [{0x4, 0xfb, 0x3}, {0x1, 0x3, 0x0, [], 0x4}, {0x5, 0x3, 0x4, [], 0x81}, {0x20, 0x5, 0x6, [], 0x6}, {0x80, 0x0, 0x4, [], 0x3e}, {0x8, 0x81, 0x80, [], 0x5}, {0x20, 0xf7, 0x7, [], 0x3c}, {0x7, 0x9, 0x2}, {0x1e, 0x5, 0x80, [], 0x80}, {0x8, 0x1, 0x5, [], 0x9}, {0x1, 0x0, 0x2, [], 0x1}, {0x2, 0x72, 0xff, [], 0xfa}, {0xfe, 0x2, 0x5e}, {0x7, 0x80, 0x6e, [], 0xf8}, {0x1, 0x80, 0x3, [], 0x9}, {0x5, 0x0, 0x35}, {0x9, 0x3, 0x81, [], 0x5}, {0x5, 0xea, 0x3f, [], 0x91}, {0x1a, 0xfd, 0x6, [], 0x8}, {0x7f, 0x79, 0x4, [], 0x6}, {0x40, 0x1, 0x8d, [], 0xa6}, {0x0, 0x20, 0xff, [], 0xe0}, {0x6, 0x3, 0x3, [], 0x81}, {0x0, 0x6, 0x8, [], 0x5}]}}) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f00000003c0)=""/4096) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x10, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) fstat(r1, &(0x7f0000001b80)) 07:28:22 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x420003, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000040)=""/4096) r1 = syz_open_dev$dri(&(0x7f0000001040)='/dev/dri/card#\x00', 0x7, 0x60140) fallocate(r1, 0x10, 0x3, 0x5) r2 = openat(0xffffffffffffffff, &(0x7f0000001080)='./file0\x00', 0x2200, 0x100) setsockopt$inet_tcp_int(r2, 0x6, 0x12, &(0x7f00000010c0)=0x9100, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000001100)={0x8, 0x6, 0x3}) openat$random(0xffffffffffffff9c, &(0x7f0000001180)='/dev/urandom\x00', 0x20000, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000002740)='/dev/dmmidi#\x00', 0x152a, 0xc0803) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000002780)=0xe, 0x4) r4 = syz_open_dev$usbmon(&(0x7f00000027c0)='/dev/usbmon#\x00', 0xe51b, 0x400000) r5 = syz_open_dev$adsp(&(0x7f0000002c40)='/dev/adsp#\x00', 0x8, 0x1c1042) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000002cc0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f0000002e00)={&(0x7f0000002c80)={0x10, 0x0, 0x0, 0x4000080}, 0xc, &(0x7f0000002dc0)={&(0x7f0000002d00)={0x98, r6, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xe1d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_MEDIA={0x4c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf05}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) r7 = socket$can_raw(0x1d, 0x3, 0x1) r8 = dup2(r4, 0xffffffffffffffff) fcntl$dupfd(r7, 0x406, r8) r9 = mq_open(&(0x7f0000002e40)='/dev/adsp#\x00', 0x0, 0x24, &(0x7f0000002e80)={0x9, 0xfff, 0x8000, 0x401, 0x4ef1, 0x3, 0x29, 0xfffffffffffff081}) fcntl$dupfd(r9, 0x0, 0xffffffffffffffff) r10 = syz_genetlink_get_family_id$SEG6(&(0x7f0000002f00)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000003000)={&(0x7f0000002ec0), 0xc, &(0x7f0000002fc0)={&(0x7f0000002f40)={0x6c, r10, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, [], 0x1e}}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4c450}, 0x4000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000003040)=[@in6={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8001}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x1, @rand_addr="cc7ba7c37c4e1bc371141e2822a4efa3"}, @in6={0xa, 0x4e23, 0xfa8, @rand_addr="e664634e68b020d842b6d71078e0887b", 0x8}, @in6={0xa, 0x4e22, 0x7, @mcast1, 0x1}, @in6={0xa, 0x4e20, 0x101, @loopback, 0x40}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e21, @multicast2}], 0xcc) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) recvfrom(r11, &(0x7f0000003140)=""/85, 0x55, 0x10001, &(0x7f00000031c0)=@isdn={0x22, 0x1, 0x4, 0x40, 0x6}, 0x80) r12 = syz_open_dev$adsp(&(0x7f0000003240)='/dev/adsp#\x00', 0x10001, 0x40) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000003280)={0x0, 0x5, 0x3, [0x6, 0x80, 0x180]}, &(0x7f00000032c0)=0xe) setsockopt$inet_sctp6_SCTP_CONTEXT(r12, 0x84, 0x11, &(0x7f0000003300)={r13, 0x1}, 0x8) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000003340)='/dev/qat_adf_ctl\x00', 0x55ba94b81bc43022, 0x0) r14 = openat$dir(0xffffffffffffff9c, &(0x7f0000003380)='./file0\x00', 0x2000, 0x1) ioctl$FS_IOC_GETVERSION(r14, 0x80087601, &(0x7f00000033c0)) [ 366.211011][ T12] usb 3-1: device descriptor read/64, error 18 07:28:22 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x9, 0x484102) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xffffffffffffff98) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x8, 0x0, "9fc72b543b28dd4728c3988b7adea76fa59f716c731782304d2a8b2baf8c1724fb01b86d7c1d88f3c7322926d8f0fcdb51b5df3ba8b696320eb85ae1bd8e6af048c54f27e0dad819d7cb50aaa2bc300f"}, 0xd8) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r5, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000000080)="70cc5ea7df617916c1498516fbfb33d1d04a03ccdc89017e107c42472a619c15d89684e0afd9625452af74390d6a3792949a8f782f0efb6782328cdc88", 0x3d) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) sendto$inet6(r0, 0x0, 0xffffff91, 0x20000008, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x6e) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) r6 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r6, 0x7fff) sendfile(r1, r6, &(0x7f0000d83ff8)=0x4, 0x8000ffffbffe) [ 366.533125][ T30] usb 2-1: new full-speed USB device number 5 using dummy_hcd [ 366.576989][T12698] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 366.831536][ T30] usb 2-1: device descriptor read/64, error 18 [ 366.837224][T12699] IPVS: ftp: loaded support on port[0] = 21 [ 367.074477][T12699] chnl_net:caif_netlink_parms(): no params data found 07:28:23 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) fstat(r0, &(0x7f0000000040)) r1 = gettid() tkill(r1, 0x1000000000016) syz_open_procfs(r1, &(0x7f0000000000)='oom_score_adj\x00') r2 = socket$inet6(0xa, 0xa, 0x1e) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f0000000580)={0x1, 0x3, 0x1000, 0xc6, &(0x7f0000000440)="7b4efac100c89254fdd14428209cac360e6e4ef46c93a523a4be07a936e85d41336d0df218a1cee9c8a8ccac823c0eb76be07d997938784830990a578c69e99605476126ba16d87ea56b027074a209cddc1b80c0132f090694a37a9911bf8fc3ff5ca801c4bf26457101725c2f1cceae30fbf17d3aa0d21a234664d3aee4ffe2c080f2204d318cd79dd7bad8c6460c8b6c6e0ce87b14b350769770786982780ffc80d38614b3ff53912d6067e84d1754fb029eb51b0fe02f3aa4f62e6f8ee4a073f270e2d435", 0xf, 0x0, &(0x7f0000000540)="fea76aea045fe7f9a60aeaab849c52"}) 07:28:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'netdevsim0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x311480, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r4, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) r5 = fcntl$dupfd(r1, 0xa0f, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDSKBLED(r5, 0x4b65, 0x280000000000) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x400800, 0x0) ioctl$LOOP_GET_STATUS(r7, 0x4c03, &(0x7f0000000280)) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r6, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SG_GET_ACCESS_COUNT(r9, 0x2289, &(0x7f0000000040)) [ 367.216377][T12706] bond0: (slave bond_slave_1): Releasing backup interface [ 367.223947][ T30] usb 2-1: device descriptor read/64, error 18 [ 367.360878][T12699] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.368589][T12699] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.377678][T12699] device bridge_slave_0 entered promiscuous mode [ 367.394556][T12708] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 367.408632][T12707] bond0: (slave bond_slave_1): Releasing backup interface [ 367.493240][ T30] usb 2-1: new full-speed USB device number 6 using dummy_hcd [ 367.521167][T12699] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.528585][T12699] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.538007][T12699] device bridge_slave_1 entered promiscuous mode [ 367.552762][T12709] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 367.566377][T12711] bond0: (slave bond_slave_1): Releasing backup interface [ 367.689893][T12712] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 367.731824][T12707] bond0: (slave bond_slave_1): Releasing backup interface [ 367.762785][ T30] usb 2-1: device descriptor read/64, error 18 [ 367.854096][T12699] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 367.872070][T12709] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 367.888373][T12712] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 367.904782][T12699] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:28:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'netdevsim0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x311480, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r4, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) r5 = fcntl$dupfd(r1, 0xa0f, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDSKBLED(r5, 0x4b65, 0x280000000000) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x400800, 0x0) ioctl$LOOP_GET_STATUS(r7, 0x4c03, &(0x7f0000000280)) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r6, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SG_GET_ACCESS_COUNT(r9, 0x2289, &(0x7f0000000040)) [ 367.973451][T12699] team0: Port device team_slave_0 added [ 367.987548][T12699] team0: Port device team_slave_1 added [ 368.106952][T12699] device hsr_slave_0 entered promiscuous mode [ 368.152230][ T30] usb 2-1: device descriptor read/64, error 18 [ 368.182859][T12699] device hsr_slave_1 entered promiscuous mode [ 368.272410][T12699] debugfs: Directory 'hsr0' with parent '/' already present! [ 368.283402][ T30] usb usb2-port1: attempt power cycle [ 368.294216][T12719] bond0: (slave bond_slave_1): Releasing backup interface [ 368.445953][T12720] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 368.459501][T12721] bond0: (slave bond_slave_1): Releasing backup interface [ 368.628403][T12717] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:28:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'netdevsim0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x311480, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r4, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) r5 = fcntl$dupfd(r1, 0xa0f, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDSKBLED(r5, 0x4b65, 0x280000000000) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x400800, 0x0) ioctl$LOOP_GET_STATUS(r7, 0x4c03, &(0x7f0000000280)) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r6, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SG_GET_ACCESS_COUNT(r9, 0x2289, &(0x7f0000000040)) [ 368.783344][T12699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 368.806586][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 368.816487][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.832616][T12699] 8021q: adding VLAN 0 to HW filter on device team0 [ 368.851178][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 368.861629][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.870851][ T3739] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.878142][ T3739] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.936808][T12699] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 368.947826][T12699] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 368.962834][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 368.972277][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 368.982000][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.991099][ T3739] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.998407][ T3739] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.007051][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 369.017169][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 369.027412][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 369.037630][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 369.048735][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 369.059211][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 369.070092][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 369.079575][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 369.090263][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 369.102938][ T30] usb 2-1: new full-speed USB device number 7 using dummy_hcd [ 369.138645][T12729] bond0: (slave bond_slave_1): Releasing backup interface [ 369.193236][ T30] usb 2-1: Invalid ep0 maxpacket: 0 [ 369.262643][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 369.271438][ T3739] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 369.288641][T12728] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 369.300151][T12730] bond0: (slave bond_slave_1): Releasing backup interface [ 369.370725][ T30] usb 2-1: new full-speed USB device number 8 using dummy_hcd [ 369.465701][T12699] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 369.480341][T12731] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 369.480932][ T30] usb 2-1: Invalid ep0 maxpacket: 0 [ 369.504132][ T30] usb usb2-port1: unable to enumerate USB device 07:28:25 executing program 2: r0 = socket(0x1e, 0x4, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000100)=0x10) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000), 0x1e6}], 0x1038) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) fsync(r2) sendmmsg(r1, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000440)="c0479cf48ac682353c9ae21978a54b1db7a85a8c1269e68165c876514f6d13c9bc540fe149d6793e864cb201da560fa10b5fe894af378bacdddb10007d5395f8f0d51be10ec9ab3bd20f0552dc1a99a28418af3b3d4219eaffe5080ceefb1d6ea411c5a3b75daa8347c3252b90a0724bb306bfccc2a4e6886c785ff76c12f5be01f759774d4e682250bf1f19b39278f13c25c280a8a3f5678e163c5e53117559a810931505c1c0f39eae322a8d0ac9f8f8ed8ed7793d035bf9c388855212815d11cc00"/206, 0xce}, {&(0x7f0000000240)="5d102a959982e5a7b51aa31216eb0bf86fa5337aa09c7b56d77f01d9a2af6fd46aac49104372498f99831abd2603b155cd70ea932a3f18abea4c986c585477d4ce5c54283d44a1bd06f545fd6c9cc5071da3213c9ab01a9f31d2cd7f3d11cd4d5485b481a12d468e2047856e719a1a97930a280336020fb84901029bc0f5d200b6511bcec25ccf2219d7e13a0e2ebba27f0f4a74a231ce62188920602f6c6af2eff978a4b95fc8d6683e8da2", 0xac}, {&(0x7f0000000300)="c53934ec719817236031fcc4cc6fae933f2a30db2fb3445564e00aa34b248afe89c27b5ba71ecb4a0a87479dd049732db20a602b42e28fc5c91dedb1932b9e80621b5d5a1ca473761edc0d10c97ee24e7632429b222d5cb20339018b473085e3e47580f110532b333380819b8f578dbdc302b479fc34100280718aa1f2f7f338fcd37c31b3f992eab46bf5590430b21c7d6f4240d2a697899bb14549b000f7e250929fe0f887d0e0d4ea17234f481625bd8c6bad9a3fa7755eaf265ef7a7e29a8e9556ea8ec622da68cf949c44d6bbfd095fded5f5d88eb5199cabdbe250f8996a05325086852be664fc0b22b34a2496", 0xf0}, {&(0x7f0000000400)="bf01d0424f1df8e615896918e3b1f5dc5dadcde423fd44f5fe71317a1861689e695b0c3ea5daef1764", 0x29}, {&(0x7f0000000980)="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", 0x12e}, {&(0x7f0000000540)="7c6486065d0ed88a7ecc8d7067d5d11a260dfd3f0073cc3a0e336855ba77da0101aa11313c4b6df5eda0698e2683715ccf8e6be2ba33f4650559a90739ef52d2e9b63c3fc77cecd322033c8abb0e59b716268d10eb42a0e90293d84673f9e4d600f21504d09c42270d9f3195aea83fee7c7a76666a6d4f435cf2e62cff55ba732673b213f21edf0cabe6f452d214a22dd5143dc31c0a74944d4c90ec514515b1bbecced5c50d9c25a2030601d6890ac99901cd5683b47c3b95ebd47e26668f1c64deba60353960c082fda70ecabf632cfb6d2124518f1e5652641e0e32736a6e1034ef", 0xe3}, {&(0x7f0000000640)="8aea0e42d834654adf653b37ca8d15654eb632d88a1d1b2b6d90d38a314f33164228be159ff6a4a2adf9c517f21c5d479d9fac58345c04031aa7d623165c1dd568a5c9c44c050196592bfa9b1417638dd2f221d305669a4936cc806525454c93c2675e2e18aad77b3f70cad0cbc5a9e0609dc9ff60ea58a03156fc0c25fe42655a0151a0fc3353b29ebfc617577f37b75b27ee1cb66a93674500f746ab88faa0073dfa74325e", 0xa6}, {&(0x7f0000000700)="a7d9fdfba25c7170e584fd6d1639f113a55ab402bb97955e742c698eada27400b262dfb2c7ccc7903dcd76355399a63a3a3578239dd57d9d4170b78aeef5b7fd3d0559e227ad1646c652b87261945321014ce27c1acf66fa1c700c73c801b5d2a439acf871b3bec3aa0c9b99702fdbb751dc04fdbc089d813e46a0fd6f3badee595341876edd78678cd73af6aaeedb4417ea374b04cb71582f1824010d162dc99e963e0a6c536703b2f52d48c2f6d6af801db03b7561944af53d54d70d84e2069b41442d8eec36aa62a8a5ac5c612a5fbbd551d628d3816ade6a566fc7bf29", 0xdf}, {&(0x7f0000000800)="f94b25720fa06835b9f6b7aa2db3a069d84893cba5ac48c858aadded05c3148f622965bcef050c96a37b6b4e2deac85d153dc21e484493e8c188292493a92acce7c5edfd387f600804b002a7864a01a477e382640fef9eddfe0ce3fbd995b7b5acde8d0b", 0x64}], 0x9}}], 0x1, 0x840) select(0x40, &(0x7f0000000040), &(0x7f00000000c0)={0x12}, 0x0, 0x0) 07:28:25 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$smack_current(r2, &(0x7f0000000000)='posix_acl_accesskeyring\xd6\x00', 0x19) r3 = socket(0x2, 0x6, 0x1f) write(r3, &(0x7f0000000080)="1f0000000104fffffd3b54c007110000f30501000b000600000010000000cf", 0x1f) 07:28:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x14, 0x2, [@IFLA_BOND_MIIMON={0xfffffdb1}, @IFLA_BOND_UPDELAY={0x8, 0x4, 0xfffffffffffffff}]}}}]}, 0x44}}, 0x0) [ 369.884781][T12745] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 07:28:26 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xd7, 0x40000) ioctl$VIDIOC_S_FBUF(r2, 0x4030560b, &(0x7f00000000c0)={0x2a, 0x10, &(0x7f00000003c0)="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", {0x9, 0x5, 0x3066ad453ad29f69, 0x8, 0x20, 0x316, 0x5, 0x1}}) ioctl$RTC_AIE_ON(r0, 0x7001) read$hidraw(0xffffffffffffffff, &(0x7f0000000100)=""/71, 0x47) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000000), 0x4) ioctl$RTC_AIE_OFF(r0, 0x7002) 07:28:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000011c0)=@ipmr_delroute={0x20, 0x19, 0xf05, 0x0, 0x0, {0x80, 0x20}, [@RTA_METRICS={0x4}]}, 0x20}}, 0x0) socket$kcm(0x29, 0x2, 0x0) 07:28:26 executing program 2: r0 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x100000000000012, 0x7, 0x1, 0x3, 0x0, "", {{}, [{{0x9, 0x5, 0x82, 0x2, 0x355}}]}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000900)={0xac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x20, 0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x88}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) 07:28:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xe4030000, 0x25}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 07:28:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) r5 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x5) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={r0, r5}) r6 = socket$can_bcm(0x1d, 0x2, 0x2) sendfile(r6, r3, 0x0, 0x5) sendmmsg(r4, &(0x7f0000002dc0)=[{{&(0x7f0000001440)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000003c0), 0x200003c0}], 0x1}}], 0x1, 0x0) 07:28:26 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x906d93c78c6f1bd9, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x400, 0x20}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000100)={r4, 0x5}, &(0x7f0000000180)=0x8) getgroups(0x4, &(0x7f0000000140)=[0x0, r2, 0x0, 0x0]) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000140)=[0x0, r5, 0x0, 0x0]) setresgid(r1, r2, r5) [ 370.392922][T12767] bond0: (slave bond_slave_1): Releasing backup interface [ 370.402560][ T12] usb 3-1: new high-speed USB device number 5 using dummy_hcd 07:28:26 executing program 0: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="6f6b3b35df3d8ee1b184d60be3b09014fb24b9af6c129814b3c9b68168acc790e228a83942ca7e29816105ab18e7700a4afc476cb32f0afc24dc3e56f55b836e8cc203c71f524819410d", 0x4a) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000200)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x8) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x6, 0x595263347aa708bd) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000100)={0x0, @reserved}) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_map={0x1f, 0x1, 0x6fbe, 0x54, 0x81, 0x7}}) sendto$packet(0xffffffffffffffff, &(0x7f0000000280)="b80f2c22f3993ab59cbf69461183dc0419e5c1e218af8a464b6a14b9383d178d536b384b8a75eaa5451459a5f7c85be7616826ce4eaa261e2aaac147aa5d1c04d9ce92e771306640f2", 0x49, 0x8088, &(0x7f0000000300)={0x11, 0xf8, 0x0, 0x1, 0x28, 0x6, @dev={[], 0x21}}, 0x14) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) fstat(r1, &(0x7f0000001b80)) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0), 0x10) [ 370.593305][T12774] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 370.662144][ T12] usb 3-1: Using ep0 maxpacket: 8 07:28:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r5, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r5, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001c00)=@newlink={0x64, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8, 0xa, 0xdb2e}, @IFLA_LINKINFO={0x3c, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x2c, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @rand_addr="2e9ef0e1be118746bbbf83fb842f5512"}, @IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr="32c6e6b6cb33cabacf730a75781fdb13"}]}}}]}, 0x64}}, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r6, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x29401040}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x78, r7, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1f0000}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x800}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000000}, 0x4810) bind$netlink(r5, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbff, 0x1000}, 0xc) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000540)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r8, 0x400, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c00e}, 0x80) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_cbs={{0x8, 0x1, 'cbs\x00'}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newqdisc={0x30, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8, 0x1, 'pie\x00'}, {0x4}}]}, 0x30}}, 0x0) [ 370.734719][T12781] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 370.777563][T12767] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 370.792933][ T12] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 370.802933][ T12] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 853 [ 370.813086][ T12] usb 3-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 370.826492][ T12] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 370.835805][ T12] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 370.836279][T12781] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 07:28:26 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd) openat$ptmx(0xffffffffffffff9c, 0x0, 0x9fc, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r2, 0xc0984124, 0x100000000000000) open_by_handle_at(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="ad000000a2d1275c785ab92d07051affa5c91f7eec7481f2dc30f491a460a9c6ab66df1893ba59f013b0e92e4546c89d08f7995584005979fe9eb94947d2fe9dca76c7dcea501c81094e56bb77959a8d450518347970ea1395966e180f23c4a85de82c50bc1a4d2a9ac296fa831e6a8b60fe458aef45f5238ce6439282c55ff52f3043a9ffcc4c92c6e6b0e1ca4535538628a00bb7cac34def00000000"], 0x200000) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x2, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0x8}}, 0x20) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x2) ioctl$UI_DEV_DESTROY(r0, 0x5502) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000000040)=0x7fff) socketpair(0x1, 0x1, 0x2e, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$RXRPC_SECURITY_KEYRING(r5, 0x110, 0x2, &(0x7f00000003c0)=')security\x00', 0xa) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000400)=0x2, 0x4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) 07:28:27 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r1) r2 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xfffffffffffffffa) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) keyctl$clear(0x7, r1) r3 = request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='ns\x00', r1) keyctl$assume_authority(0x10, r3) fstat(r0, &(0x7f0000001b80)) [ 370.899514][T12786] bond0: (slave bond_slave_1): Releasing backup interface [ 371.054584][T12794] IPVS: ftp: loaded support on port[0] = 21 07:28:27 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, &(0x7f0000001b80)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x1, 0x0) write$capi20(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x1, 0x8b, 0x82, 0x2, 0x7c23}, 0x10) [ 371.177052][T12788] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:28:27 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) fstat(r0, &(0x7f0000000040)) [ 371.280813][T12788] bond0: (slave bond_slave_1): Releasing backup interface [ 371.445259][ T12] usblp 3-1:1.0: usblp0: USB Bidirectional printer dev 5 if 0 alt 0 proto 3 vid 0x0525 pid 0xA4A8 [ 371.478238][T12790] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 371.546631][T12809] IPVS: ftp: loaded support on port[0] = 21 07:28:27 executing program 0: syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x2000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x800) write(r1, &(0x7f00000003c0)="6113cad2d42be7d19a06e44a6aade1b16754e1fc60344d50acff183f01fe55e79f1d27f814e58fe61cf157634356785b2b0b9a10d60b75b9cd9fee369991aa0e796ce106000000000000001a4b1e2c0f23249a11fd3c41a23d000ac0ad013a621235c9e6d1547592e720817e0741250aaa4d88299517ab7a276ec40f3cc234b2129b6a2857ce83ad828d6c592aec12f6748d4ba590188a2d61962190161560d8f2e2093a2a741a623f9fff0ba49a10e9d4da38702ef0347e240338662f4c1224a5fb1d321dd4487ccbdf6d62531d1229cecb1ddbbe55826b2a82bc27d14e2ba2cf13c76f91f90319ba3205aae0131b60af0a6e21d9f4cdc1a1e33dc315ae729e8972306adea8ebb8540a63f9c45fdad230becea118ceeb5b0105e2c6227b318ccbd1cc28dad9919158b00efad7d3a87ddef98c3c00e4e3d3a429c7f95d0ca7ab37292efc15c19f655f722cf61393db1b8ba40e0d86c4f92191ea2e9bfbc6147fae7be70e9304ab8a435938d49cdfe25a8e25f8ed81ba2e24251ca68ee088702863c59c7b0c5d8e6d9966a8d9f6c9a95d965f2f059f0efd5d31", 0x3ef) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="ba", 0x1}], 0x1, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000040)={0x40, 0x8, 0x56, 0x0, 0x80000000, 0x2, 0x81, 0x9, 0x81, 0x80, 0x40, 0x81, 0x0, 0x6, 0x1, 0x6, 0x4, 0x7f, 0xb9}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r3, &(0x7f0000001b80)) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$FUSE_NOTIFY_INVAL_ENTRY(r6, &(0x7f0000000080)={0x22, 0x3, 0x0, {0x5, 0x1, 0x0, '-'}}, 0x22) [ 371.662026][ C0] usblp0: nonzero read bulk status received: -71 [ 371.671011][T12760] usblp0: error -71 reading from printer [ 371.678698][ T12] usb 3-1: USB disconnect, device number 5 [ 371.697328][ T12] usblp0: removed 07:28:27 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, &(0x7f0000001b80)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xecf3049dbd3bf75c, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/raw6\x00') connect$caif(r1, &(0x7f0000000080)=@rfm={0x25, 0x81, "6369e4a8c01589f144d32f47fd6460e1"}, 0x18) [ 372.472189][ T12] usb 3-1: new high-speed USB device number 6 using dummy_hcd [ 372.722119][ T12] usb 3-1: Using ep0 maxpacket: 8 [ 372.842240][ T12] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 372.852165][ T12] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 853 [ 372.862260][ T12] usb 3-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 372.875386][ T12] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 372.884557][ T12] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 373.204226][ T12] usblp 3-1:1.0: usblp0: USB Bidirectional printer dev 6 if 0 alt 0 proto 3 vid 0x0525 pid 0xA4A8 07:28:29 executing program 2: r0 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x100000000000012, 0x7, 0x1, 0x3, 0x0, "", {{}, [{{0x9, 0x5, 0x82, 0x2, 0x355}}]}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000900)={0xac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x20, 0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x88}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) 07:28:29 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x9c) r1 = socket$packet(0x11, 0x400000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000ff5ffc)={0x0, 0x3}, 0x4) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f00000001c0)={0x2, &(0x7f00000000c0)=[{0x0, 0x72, 0x1}, {0xe7fa, 0x6, 0x0, 0x100}]}, 0x10) read(r1, &(0x7f0000000000)=""/129, 0x81) read(r1, &(0x7f0000000100)=""/150, 0xfffffffffffffee6) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 07:28:29 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='ns\x00') fstat(r0, &(0x7f0000001b80)) write$P9_RVERSION(r0, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x1, 0x8, '9P2000.L'}, 0x15) 07:28:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x223e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = msgget(0x2, 0x0) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000380)=""/102) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000180)=""/138) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') process_vm_writev(0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/21, 0x15}], 0x10000000000000ca, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000140)="ba", 0x1}], 0x1, 0x0) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f00000000c0)={0x5, &(0x7f0000000040)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000100)={r6}) writev(r2, &(0x7f0000000080), 0x5b) 07:28:29 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_DEV_DESTROY(r1, 0x5502) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) write$P9_RATTACH(r0, &(0x7f00000000c0)={0x14, 0x69, 0x1, {0x1d, 0x3, 0x5}}, 0x14) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000100)=""/232, 0xe8}, {&(0x7f0000000200)=""/211, 0xd3}], 0x2) prctl$PR_SET_TIMERSLACK(0x1d, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000340)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_FREE_BUFS(r3, 0x4010641a, &(0x7f00000003c0)={0x3, &(0x7f0000000380)=[0x1ff, 0x7, 0x5]}) socket(0xa, 0x2, 0x7f) r4 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000400)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000440)={0x1, 0x8, 0x2}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000480)={0x3a, @loopback, 0x4e23, 0x2, 'nq\x00', 0x22, 0xb675, 0x7}, 0x2c) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f00000004c0)=0x2, 0x4) r5 = getegid() lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f00000005c0)=[0xee01, 0x0, 0xee01, 0x0]) getgroups(0x3, &(0x7f0000000600)=[r5, r6, r7]) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000640), 0x10) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000680)='/dev/hwrng\x00', 0x40000, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r8, 0x800442d2, &(0x7f0000000740)={0x4, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @random}]}) r9 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000780)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMON(r9, 0x40045612, &(0x7f00000007c0)=0x100) setsockopt$inet6_int(r2, 0x29, 0x98, &(0x7f0000000800)=0xf0, 0x4) r10 = syz_open_dev$swradio(&(0x7f0000000840)='/dev/swradio#\x00', 0x0, 0x2) r11 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r10, 0x4c81, r11) ioctl$KVM_SMI(r10, 0xaeb7) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0xccbf51c327c4a3d9, r4, 0x0) r12 = syz_open_dev$vcsn(&(0x7f0000000880)='/dev/vcs#\x00', 0x8, 0x10000) write$P9_RXATTRCREATE(r12, &(0x7f00000008c0)={0x7, 0x21, 0x1}, 0x7) [ 373.271261][ T2899] usb 3-1: USB disconnect, device number 6 [ 373.283293][ T2899] usblp0: removed [ 373.386732][T12830] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 373.407964][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 373.542380][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 373.548607][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 373.554945][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 373.561068][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:28:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x61e4, 0x4) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x37ba8c65eff6df83) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x7}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000002c0)={r2, 0x2a6, 0x60, "582c1e9a7cfd2d44cc1e6d5ecda432b564fd3f856faf89721304f3496786923d19e49adfbaddcdf43757e8f94d51fabf179ac5185581bb82a26bc385822a9fe6d9e915ebb20ee3222493855e42464f4ee3dca222a1e6c96684cfefad98ab63ec"}, 0x68) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x6000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 373.782216][ T2899] usb 3-1: new high-speed USB device number 7 using dummy_hcd [ 374.022266][ T2899] usb 3-1: Using ep0 maxpacket: 8 [ 374.144177][ T2899] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 374.154140][ T2899] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 853 [ 374.164293][ T2899] usb 3-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 374.179229][ T2899] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 07:28:30 executing program 1: r0 = socket(0x1e, 0x5, 0x0) sendmsg(r0, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000008000)={0x0, 0x0, &(0x7f0000241ff0)=[{&(0x7f00009a9fff)=""/1, 0x1}], 0x1}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000180)={@dev}, &(0x7f00000001c0)=0x14) recvmmsg(r0, &(0x7f0000003900)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f0000000000)=""/43, 0x2b}}, {{0x0, 0x1de, &(0x7f00000037c0)=[{&(0x7f0000000040)=""/225, 0xe1}], 0x11b, 0x0, 0xd6}}], 0x2, 0x3, 0x0) [ 374.188502][ T2899] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 374.387415][T12845] IPVS: ftp: loaded support on port[0] = 21 07:28:30 executing program 1: r0 = socket(0x1e, 0x5, 0x0) sendmsg(r0, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000008000)={0x0, 0x0, &(0x7f0000241ff0)=[{&(0x7f00009a9fff)=""/1, 0x1}], 0x1}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000180)={@dev}, &(0x7f00000001c0)=0x14) recvmmsg(r0, &(0x7f0000003900)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, &(0x7f0000000000)=""/43, 0x2b}}, {{0x0, 0x1de, &(0x7f00000037c0)=[{&(0x7f0000000040)=""/225, 0xe1}], 0x11b, 0x0, 0xd6}}], 0x2, 0x3, 0x0) [ 374.898993][ T2899] usblp 3-1:1.0: usblp0: USB Bidirectional printer dev 7 if 0 alt 0 proto 3 vid 0x0525 pid 0xA4A8 07:28:31 executing program 1: r0 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/1152], 0x310) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) [ 375.002613][T12845] chnl_net:caif_netlink_parms(): no params data found [ 375.152033][ C0] usblp0: nonzero read bulk status received: -71 [ 375.159110][T12833] usblp0: error -71 reading from printer [ 375.168941][ T2899] usb 3-1: USB disconnect, device number 7 [ 375.181950][ C0] usblp0: nonzero read bulk status received: -108 [ 375.191595][ T2899] usblp0: removed 07:28:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="ba", 0x1}], 0x1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f00000002c0)) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x40000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, &(0x7f0000000200)) listen(r0, 0xa) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000440)={0x1cc, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x138}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffb}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}]}, @TIPC_NLA_BEARER={0xdc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'ip6gretap0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, [], 0x24}, 0x3ff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}, 0x96b4}}}}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x1a}, 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x6, @remote}}}}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x40000}, 0x80c4) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r3, 0x0) ioctl$NBD_CLEAR_QUE(r3, 0xab05) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, &(0x7f0000000180)={0x20, 0x1, 0x9, 0x1, 0x7}) semget$private(0x0, 0x2, 0x104) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xf}}], 0x10) socket(0x10, 0x3, 0x0) r5 = socket$inet6_sctp(0xa, 0x3, 0x84) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="08000000d405090080000800080003008e000100"], &(0x7f0000000140)=0x14) [ 375.206312][T12845] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.213628][T12845] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.222764][T12845] device bridge_slave_0 entered promiscuous mode [ 375.284858][T12845] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.292269][T12845] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.301123][T12845] device bridge_slave_1 entered promiscuous mode [ 375.385884][T12845] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 375.432401][T12845] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 375.453071][ C1] hrtimer: interrupt took 35103 ns [ 375.558756][T12845] team0: Port device team_slave_0 added [ 375.585970][T12845] team0: Port device team_slave_1 added [ 375.763092][T12864] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 07:28:31 executing program 2: r0 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x100000000000012, 0x7, 0x1, 0x3, 0x0, "", {{}, [{{0x9, 0x5, 0x82, 0x2, 0x355}}]}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000900)={0xac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x20, 0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x88}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) 07:28:32 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/eev\binput\xd7\xb7\xf1\x9b\xf6\x13\x94n', 0x80000000fffffffd, 0x14000) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, &(0x7f0000000080)={0x6, 0x1}) r1 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x1a9a00) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r7) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast2, @in6=@initdev}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000004c0)={@mcast1, 0x0}, &(0x7f0000000500)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000480)={@loopback, 0x19, r8}) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001c00)=@newlink={0x64, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_OPERSTATE={0x8, 0xa, 0xdb2e}, @IFLA_LINKINFO={0x3c, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x2c, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @rand_addr="2e9ef0e1be118746bbbf83fb842f5512"}, @IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr="32c6e6b6cb33cabacf730a75781fdb13"}]}}}]}, 0x64}}, 0x0) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r9, &(0x7f0000000880)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x401028}, 0xc, &(0x7f0000000840)={&(0x7f00000005c0)={0x254, r10, 0x400, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x723}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9cd}]}, @TIPC_NLA_LINK={0xf0, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x73cbe23a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf129}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc27}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfcf7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x23}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}]}]}, 0x254}, 0x1, 0x0, 0x0, 0x30008808}, 0x10) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r11, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r11, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) close(r11) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/249) syz_emit_ethernet(0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa192bce5e2dfb86dd3ad433896000000000640600fe8000000000000000000d00000000aafe8000000000000000000000000000aaf50624231c4b1e9b1b09d737024ea3c9bb8fe5ffc3fc5e099255e1b791ae6d5180cf4f0bc99cffc5ad4fb5aba8253d6da3fd0100191b2c9d7e628e1bbfd4099d78f9571d1801bd61e5bc048c3877748948b33598bce6ef7e29f4eff7f412b59608b5ca9cdbbf8a2085a56eb880830cfde6c4b5c02ba903566352657652e34880a057379d0ea9879b56caba1620103d32ec49e4d1644900"/222, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="9002000090780000030300080a0000000000000000051e0000000000000000000000000000000000000000000000000000000001fe0ff989b781e0000000f2290d79791312e19bdea16a57fd8887b71f37fddbbb61000000"], 0x0) [ 376.007882][T12845] device hsr_slave_0 entered promiscuous mode [ 376.053415][T12845] device hsr_slave_1 entered promiscuous mode [ 376.096991][T12845] debugfs: Directory 'hsr0' with parent '/' already present! [ 376.174489][T12875] bond0: (slave bond_slave_1): Releasing backup interface [ 376.232581][ T2899] usb 3-1: new high-speed USB device number 8 using dummy_hcd 07:28:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="ba", 0x1}], 0x1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f00000002c0)) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, 0x0, 0x40000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, &(0x7f0000000200)) listen(r0, 0xa) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000240)={&(0x7f0000000440)={0x1cc, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x138}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffb}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}]}, @TIPC_NLA_BEARER={0xdc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'ip6gretap0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, [], 0x24}, 0x3ff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}, 0x96b4}}}}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x1a}, 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x6, @remote}}}}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x40000}, 0x80c4) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r3, 0x0) ioctl$NBD_CLEAR_QUE(r3, 0xab05) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, &(0x7f0000000180)={0x20, 0x1, 0x9, 0x1, 0x7}) semget$private(0x0, 0x2, 0x104) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xf}}], 0x10) socket(0x10, 0x3, 0x0) r5 = socket$inet6_sctp(0xa, 0x3, 0x84) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="08000000d405090080000800080003008e000100"], &(0x7f0000000140)=0x14) [ 376.425649][T12877] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 376.493337][ T2899] usb 3-1: Using ep0 maxpacket: 8 [ 376.554951][T12883] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 07:28:32 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x4}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x100}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2100, 0x0) ioctl$VFIO_IOMMU_GET_INFO(r3, 0x3b70, &(0x7f0000000080)={0x10}) [ 376.596857][T12845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 376.646992][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 376.655981][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 376.666900][ T2899] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 376.670918][T12845] 8021q: adding VLAN 0 to HW filter on device team0 [ 376.676740][ T2899] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 853 [ 376.676836][ T2899] usb 3-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 376.676952][ T2899] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 376.677019][ T2899] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 376.839088][T12888] Failed to remove local publication {65,0,0}/354730758 [ 376.880690][T12889] Failed to remove local publication {65,0,0}/1503627314 [ 376.892792][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 376.903144][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 376.912285][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.919476][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.000881][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 377.010338][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 377.019952][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 377.029200][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.036535][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state 07:28:33 executing program 1: stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000140)=[0x0, r0, 0x0, 0x0]) setfsgid(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x8, 0x16, [{0x4}]}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r4, 0xc0385720, &(0x7f0000000040)={0x1, {}, 0x7, 0x800}) [ 377.045217][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 377.055537][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 377.065737][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 377.075786][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 377.085509][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 377.095581][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 377.105061][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 377.114257][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 377.130775][T12845] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 377.145023][T12845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:28:33 executing program 3: syz_usb_connect(0x2, 0x1, &(0x7f0000000000)=ANY=[@ANYRESDEC=0x0], 0x0) [ 377.177203][ T2899] usblp 3-1:1.0: usblp0: USB Bidirectional printer dev 8 if 0 alt 0 proto 3 vid 0x0525 pid 0xA4A8 [ 377.246348][T12894] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 377.330907][T12845] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 377.345397][T12898] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 377.402086][ C0] usblp0: nonzero read bulk status received: -71 [ 377.403296][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 377.411426][T12873] usblp0: error -71 reading from printer [ 377.417884][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 377.431027][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 377.438976][ C0] usblp0: nonzero read bulk status received: -71 [ 377.448823][ T2899] usb 3-1: USB disconnect, device number 8 [ 377.476360][ T2899] usblp0: removed 07:28:33 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@ipv6_getrule={0x20, 0x22, 0x100, 0x70bd29, 0x25dfdbfe, {0xa, 0x0, 0x80, 0x7, 0xcf, 0x0, 0x0, 0xb, 0x8}, ["", "", "", "", "", "", "", "", ""]}, 0xfffffffffffffdd1}, 0x1, 0x0, 0x0, 0xe4}, 0x80) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 07:28:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) dup3(r0, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0xfffffffffffff001, 0x5) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) mincore(&(0x7f0000ff1000/0xd000)=nil, 0xd000, &(0x7f00000000c0)=""/121) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_IOCTL(r4, &(0x7f0000000200)={0x20, 0x0, 0x1, {0xd11, 0x6, 0x2, 0x4}}, 0x20) accept$inet(r1, 0x0, &(0x7f0000000000)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x20000, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r5, 0x4010ae94, &(0x7f00000001c0)={0x3, 0x6, 0x101}) 07:28:34 executing program 2: r0 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x100000000000012, 0x7, 0x1, 0x3, 0x0, "", {{}, [{{0x9, 0x5, 0x82, 0x2, 0x355}}]}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000900)={0xac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x20, 0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read$char_usb(r1, 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r1, 0x88}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) 07:28:34 executing program 3: timer_create(0x0, 0x0, &(0x7f0000044000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0xc5d, 0x10200) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8002600}, 0xc) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffe4f, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, 0x23, 0x1, 0x0, 0x0, {0x20000000004, 0xe00000000000000}, [@typed={0x14, 0xc, @ipv6=@ipv4={[], [], @empty}}]}, 0x28}}, 0x0) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x2, {0x2, 0x0, @empty}}, 0x24) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x5}, &(0x7f0000000200)=0x8) r3 = semget$private(0x0, 0x3, 0x100) semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f00000002c0)=""/72) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) dup2(r7, r5) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg$sock(r5, &(0x7f0000005880)=[{{&(0x7f0000000400)=@ll={0x11, 0x0, r8, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}], 0x40000000000004e, 0x0) sendmsg$nl_route(r4, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40104}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@ipv6_delroute={0x24, 0x19, 0x8, 0x70bd28, 0x25dfdbff, {0xa, 0x0, 0x14, 0x80, 0xfe, 0x0, 0xc8, 0x1d, 0x400}, [@RTA_IIF={0x8, 0x1, r8}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x80000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000240)={0x3, 0x2, 0x5, 0x0, r2}, &(0x7f0000000280)=0x10) 07:28:34 executing program 4: pipe2(&(0x7f0000000080), 0x4400) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x200000, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCGETX(r2, 0x5432, &(0x7f0000000040)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r4, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r5, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r5, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r6, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r7, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @local}, {0x4000030000000304, @local}, 0x6, {0x2, 0x0, @broadcast}, '\x83O\x00\xec\x00\x00\x00\x00a\xfe\x92\xbcY\x10#\xb0'}) syz_emit_ethernet(0x4, &(0x7f0000000700)=ANY=[@ANYRES64=r3, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESDEC=r1, @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRESDEC, @ANYRESDEC=r2, @ANYRES32=r4, @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYRES32], @ANYBLOB="5c4aa9ba87291c0eb52f3ba27cb1a1e6e821cbb6ce9efbf524a9c3051d17c152be106b0e94b692df3f8cbda0ba11a97c5dae3509f0f3be2af09b7b757da82d00e962e8b2472662bc815c5fc3b85c07b6921c4ff0094d192b30eb07000000b38dfbffffff6101", @ANYRESOCT=r3], @ANYRESOCT=r5, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESDEC=r6, @ANYRES32=r1, @ANYRES64=r7, @ANYRES32, @ANYPTR64]], 0x0) [ 378.502142][ T2899] usb 3-1: new high-speed USB device number 9 using dummy_hcd [ 378.574350][T12923] netlink: 'syz-executor.3': attribute type 12 has an invalid length. [ 378.642289][T12925] bond0: (slave bond_slave_1): Releasing backup interface [ 378.677708][T12926] netlink: 'syz-executor.3': attribute type 12 has an invalid length. [ 378.752164][ T2899] usb 3-1: Using ep0 maxpacket: 8 07:28:34 executing program 1: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0xe4, 0xd7, 0x6d, 0x40, 0x61d, 0xc020, 0xcddd, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x8b, 0x0, 0x0, 0x49, 0x96, 0xfd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000001dc0)={0xac, &(0x7f00000000c0)={0x0, 0x0, 0x3, "49ef87"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) [ 378.844094][T12927] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 378.876257][T12930] bond0: (slave bond_slave_1): Releasing backup interface [ 378.912448][ T2899] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 378.922390][ T2899] usb 3-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 853 [ 378.932895][ T2899] usb 3-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 378.946071][ T2899] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 378.955403][ T2899] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 379.169880][T12931] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:28:35 executing program 3: r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x7c, 0xe3, 0xad, 0x20, 0x2001, 0x3309, 0x8a5e, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xb3, 0x0, 0x2, 0xc, 0xc1, 0x47, 0x0, [], [{{0x9, 0x5, 0x8d}}, {{0x9, 0x5, 0xf}}]}}]}}]}}, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_usb_control_io(r0, 0x0, &(0x7f0000001880)={0xac, &(0x7f0000001280)={0x0, 0x0, 0x3, "7f81b9"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chdir(&(0x7f0000000040)='./file0\x00') r1 = socket$inet(0x2, 0x80001, 0x84) connect$inet(r1, &(0x7f0000000780)={0x2, 0x4e22, @broadcast}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="e51e8bd8b735a6e92ac87fed6af1989f1affeae8d09b277bf903865a72eec9c002000000003343c97df8e54a4f678cdac84351de7d7cfbc87442f6282208f5103aba7b4a3c8b13cbc22caacce4374291b8b1f8ce38135d896fc765ac18685849fee521505e57c4c44715d7734cf3ee65eedcce5c48c67f83d0d406f7aeafb286edab38097e4b6cdacde2f38131acfe42b6"], &(0x7f0000000140)=0xd) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0xc0, &(0x7f00000001c0)=[@in6={0xa, 0x4e20, 0x7, @mcast2, 0x8}, @in={0x2, 0x4e20, @rand_addr=0x408}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e24, 0xf0c, @mcast1, 0x1}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x2, @mcast1, 0x6}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1f}}, @in6={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}]}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={r3, @in={{0x2, 0x4e22, @rand_addr=0x1}}, 0x5, 0x8001, 0x0, 0xad58, 0xa2}, 0x98) r4 = syz_usb_connect(0x1, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000073c59508c4108a81cd4c0000000109021b00010000000009040c0001030000000705810e01000000004a7abe5a15e2ae59fbce7636b80f8226cee1b202c6581ab059e2eb7d987d0d79b901000000000000004921eced2ae9fd2ec562e195b110c6fee3a6a3c196fce64f6b1ac8b407ef0f1dc1d55f97f90206a2cc9cc44097d4e596b710be8a6e7f3d0e3b257044a04d2d70f3f9a27a6a1867d87016097ced4d86ae5d622c2e83553c3e9075b44a4b23e1354943a1102729cec74b62c8cc63515ec05f0288a40000000082e96ea03059efff93201f67de21cf850e000000000000000000"], 0x0) syz_usb_control_io$cdc_ncm(r4, 0x0, &(0x7f0000000440)={0x44, &(0x7f0000000200)={0x0, 0x0, 0x3, "1f7563"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r4, &(0x7f0000000580)={0x14, &(0x7f0000000480)={0xc0, 0x9, 0xec, {0xec, 0x1, "095502a930f298553526ba2155b9854554d4606046ae96826bb584aa820250a64bcec2a64fdfed57e8883dd794b2c0a506c3547ce8fc580ed1c42ddb065b6c9f824b1ddf63845d97065fba2b778f3505955a8d83af85a101b365cb53a57c7d0ce45a7767c15a2046b52b4840e0211f9bcd138a16079ec074686da45c0ff5a145f97e190cdd5466f07d7cc4a7dcc8eba9f36650e5614bc3251baef4cc2ab6d8a0d8e6a88f0812309ef53d51a22216b1f918b7f6db7907e368dcc6e8ac24edb8bc62b3e180040e18f36e46a8f2f7c65170abce85d741a08294f032d8342ff28dcba22d103e9b5c490817b9"}}, &(0x7f0000000100)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000740)={0x1c, &(0x7f00000005c0)={0x40, 0x4bcc0e7a77dcd346, 0xd2, "071e1e589c6d3aae72e2af0163c7da932de4b9f7396b8868f64c0324841a89aa4dd9bc87690812fbd8672252f57dcb538371d42570c4b0341fdc1897c0910c9368297d73ed986ab66a4e75ccd58da1f5cf2c7781027acec1149972028dc79185bf7b49b7e7d299f58ec0d17f192d0bd913caf715df064420676b9a4c5adba4565a2ee3e88b5aaeec1e95eaa7d61939ffd355b55183053df25f854cc4d01e66a1ff940aad04ef9401ccc85c71e347377527c116c78a299e3eec1017da7d9cdeeb5461ab98520e2699956efe8e40672462f64b"}, &(0x7f00000006c0)={0x0, 0xa, 0x1, 0x8}, &(0x7f0000000700)={0x0, 0x8, 0x1, 0x9c}}) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x3, 0x6, 0x10200, 0xa15, 0x9, 0x65c, 0x1, 0xd06, r2}, 0x20) syz_usb_control_io(r0, 0x0, &(0x7f0000000840)={0xac, &(0x7f00000000c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 379.252595][T12927] bond0: (slave bond_slave_1): Releasing backup interface [ 379.372247][ T30] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 379.487014][T12930] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 379.536356][T12932] bond0: (slave bond_slave_1): Releasing backup interface [ 379.586439][ T2899] usblp 3-1:1.0: usblp0: USB Bidirectional printer dev 9 if 0 alt 0 proto 3 vid 0x0525 pid 0xA4A8 [ 379.653189][ T3739] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 379.732404][ T30] usb 2-1: config 0 has an invalid interface number: 139 but max is 0 [ 379.740809][ T30] usb 2-1: config 0 has no interface number 0 [ 379.746844][T12931] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 379.747143][ T30] usb 2-1: New USB device found, idVendor=061d, idProduct=c020, bcdDevice=cd.dd [ 379.765251][ T30] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 379.822052][ C0] usblp0: nonzero read bulk status received: -71 [ 379.831024][T12920] usblp0: error -71 reading from printer [ 379.840603][ T12] usb 3-1: USB disconnect, device number 9 [ 379.851940][ C0] usblp0: nonzero read bulk status received: -108 [ 379.870430][T12919] ===================================================== [ 379.873221][ T30] usb 2-1: config 0 descriptor?? [ 379.877594][T12919] BUG: KMSAN: use-after-free in usb_autopm_put_interface+0xf2/0x120 [ 379.890323][T12919] CPU: 0 PID: 12919 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 379.892355][ T3739] usb 4-1: Using ep0 maxpacket: 32 [ 379.898201][T12919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.898208][T12919] Call Trace: [ 379.898294][T12919] dump_stack+0x191/0x1f0 [ 379.898414][T12919] kmsan_report+0x14a/0x2f0 [ 379.925575][T12919] __msan_warning+0x73/0xf0 [ 379.926282][ T30] ssu100 2-1:0.139: Quatech SSU-100 USB to Serial Driver converter detected [ 379.930105][T12919] usb_autopm_put_interface+0xf2/0x120 [ 379.944326][T12919] usblp_release+0x182/0x3d0 [ 379.948935][T12919] ? usblp_open+0x610/0x610 [ 379.953531][T12919] __fput+0x4c9/0xba0 [ 379.957537][T12919] ____fput+0x37/0x40 [ 379.961533][T12919] ? fput_many+0x2a0/0x2a0 [ 379.966028][T12919] task_work_run+0x22e/0x2a0 [ 379.970643][T12919] prepare_exit_to_usermode+0x39d/0x4d0 [ 379.976187][T12919] syscall_return_slowpath+0x90/0x610 [ 379.981560][T12919] do_syscall_64+0xdc/0x160 [ 379.986054][T12919] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 379.991940][T12919] RIP: 0033:0x413741 [ 379.995822][T12919] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 380.015419][T12919] RSP: 002b:0000000000a6fbf0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 380.023833][T12919] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413741 [ 380.031793][T12919] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 380.039753][T12919] RBP: 0000000000000001 R08: ffffffff821f7f3a R09: 000000006e8b8120 [ 380.047715][T12919] R10: 0000000000a6fcd0 R11: 0000000000000293 R12: 000000000075bf20 [ 380.055672][T12919] R13: 000000000005cbf7 R14: 0000000000760f48 R15: 000000000075bf2c [ 380.063737][T12919] ? __se_sys_ppoll+0xaa/0x5e0 [ 380.068500][T12919] [ 380.070818][T12919] Uninit was created at: [ 380.075052][T12919] kmsan_internal_poison_shadow+0x60/0x110 [ 380.080853][T12919] kmsan_slab_free+0x8d/0x100 [ 380.085518][T12919] kfree+0x4c1/0x2e70 [ 380.089535][T12919] skb_release_data+0x7de/0x9d0 [ 380.094377][T12919] __kfree_skb+0x8a/0x210 [ 380.098695][T12919] consume_skb+0x2b0/0x2e0 [ 380.103098][T12919] skb_free_datagram+0x52/0x180 [ 380.107963][T12919] netlink_recvmsg+0xd2d/0x18e0 [ 380.112806][T12919] sock_recvmsg+0x3b3/0x3c0 [ 380.117307][T12919] ___sys_recvmsg+0x461/0x11e0 [ 380.122059][T12919] __se_sys_recvmsg+0x2fa/0x450 [ 380.126906][T12919] __x64_sys_recvmsg+0x4a/0x70 [ 380.131656][T12919] do_syscall_64+0xb6/0x160 [ 380.136146][T12919] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 380.142020][T12919] ===================================================== [ 380.148935][T12919] Disabling lock debugging due to kernel taint [ 380.155077][T12919] Kernel panic - not syncing: panic_on_warn set ... [ 380.161659][T12919] CPU: 0 PID: 12919 Comm: syz-executor.2 Tainted: G B 5.4.0-rc3+ #0 [ 380.170922][T12919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.180967][T12919] Call Trace: [ 380.184259][T12919] dump_stack+0x191/0x1f0 [ 380.188656][T12919] panic+0x3c9/0xc1e [ 380.192564][T12919] kmsan_report+0x2e8/0x2f0 [ 380.197060][T12919] __msan_warning+0x73/0xf0 [ 380.201560][T12919] usb_autopm_put_interface+0xf2/0x120 [ 380.207011][T12919] usblp_release+0x182/0x3d0 [ 380.211591][T12919] ? usblp_open+0x610/0x610 [ 380.216095][T12919] __fput+0x4c9/0xba0 [ 380.220076][T12919] ____fput+0x37/0x40 [ 380.224045][T12919] ? fput_many+0x2a0/0x2a0 [ 380.228452][T12919] task_work_run+0x22e/0x2a0 [ 380.233038][T12919] prepare_exit_to_usermode+0x39d/0x4d0 [ 380.238575][T12919] syscall_return_slowpath+0x90/0x610 [ 380.243951][T12919] do_syscall_64+0xdc/0x160 [ 380.248445][T12919] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 380.254496][T12919] RIP: 0033:0x413741 [ 380.258384][T12919] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 380.277997][T12919] RSP: 002b:0000000000a6fbf0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 380.286416][T12919] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413741 [ 380.294381][T12919] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 380.302344][T12919] RBP: 0000000000000001 R08: ffffffff821f7f3a R09: 000000006e8b8120 [ 380.310306][T12919] R10: 0000000000a6fcd0 R11: 0000000000000293 R12: 000000000075bf20 [ 380.318295][T12919] R13: 000000000005cbf7 R14: 0000000000760f48 R15: 000000000075bf2c [ 380.326287][T12919] ? __se_sys_ppoll+0xaa/0x5e0 [ 380.332343][T12919] Kernel Offset: disabled [ 380.336671][T12919] Rebooting in 86400 seconds..