[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 81.209349][ T31] audit: type=1800 audit(1569972018.269:25): pid=11350 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 81.254352][ T31] audit: type=1800 audit(1569972018.299:26): pid=11350 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 81.274644][ T31] audit: type=1800 audit(1569972018.299:27): pid=11350 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.200' (ECDSA) to the list of known hosts. 2019/10/01 23:20:33 fuzzer started 2019/10/01 23:20:37 dialing manager at 10.128.0.26:34039 2019/10/01 23:20:37 syscalls: 2412 2019/10/01 23:20:37 code coverage: enabled 2019/10/01 23:20:37 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/10/01 23:20:37 extra coverage: enabled 2019/10/01 23:20:37 setuid sandbox: enabled 2019/10/01 23:20:37 namespace sandbox: enabled 2019/10/01 23:20:37 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/01 23:20:37 fault injection: enabled 2019/10/01 23:20:37 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/01 23:20:37 net packet injection: enabled 2019/10/01 23:20:37 net device setup: enabled 23:23:47 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = socket$inet6(0xa, 0x2, 0x0) fadvise64(r2, 0x0, 0x1, 0x3) socket$inet6(0xa, 0x1000000000002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001440)='cgroup.stat\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(r3, 0x5607) fsetxattr$security_ima(r2, &(0x7f0000000300)='security.ima\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xcd, 0x1) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) r4 = getpid() r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0xe8}}, 0x0) prlimit64(r4, 0x10, &(0x7f0000000140)={0xffff, 0x3}, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) r6 = openat$cgroup_ro(r3, &(0x7f0000002480)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) fchmod(r1, 0xc0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x8002, 0x0) read$eventfd(r6, &(0x7f0000000600), 0xffffffffffffff9e) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000540)='./bus\x00', 0x0, 0x100000, 0x0) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(r4, 0x0, 0x41000001, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0xfffffef3) syzkaller login: [ 290.479988][T11515] IPVS: ftp: loaded support on port[0] = 21 [ 290.619223][T11515] chnl_net:caif_netlink_parms(): no params data found [ 290.684128][T11515] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.691399][T11515] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.700149][T11515] device bridge_slave_0 entered promiscuous mode [ 290.710481][T11515] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.717765][T11515] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.726481][T11515] device bridge_slave_1 entered promiscuous mode [ 290.759110][T11515] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 290.772205][T11515] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 290.806893][T11515] team0: Port device team_slave_0 added [ 290.816096][T11515] team0: Port device team_slave_1 added [ 290.907531][T11515] device hsr_slave_0 entered promiscuous mode [ 291.063178][T11515] device hsr_slave_1 entered promiscuous mode [ 291.343577][T11515] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.350911][T11515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.358753][T11515] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.365983][T11515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.449725][T11515] 8021q: adding VLAN 0 to HW filter on device bond0 [ 291.471124][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.484140][ T30] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.494950][ T30] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.507681][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 291.528391][T11515] 8021q: adding VLAN 0 to HW filter on device team0 [ 291.547505][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 291.557006][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.564783][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.583384][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 291.592994][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.600179][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.645796][T11515] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 291.656372][T11515] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 291.673192][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 291.684092][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 291.694811][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 291.704711][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 291.714235][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 291.724078][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 291.733648][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 291.742921][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 291.752595][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 291.761789][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 291.773440][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 291.782142][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 291.819933][T11515] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 292.194367][T11524] IPVS: ftp: loaded support on port[0] = 21 [ 292.896318][T11529] IPVS: ftp: loaded support on port[0] = 21 23:23:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{}, "8f2cb530c4c5131d", "3a6bc8cbf5f0c26e95c106070f435ee6", "aeb368b2", "73d2aaccb759e14d"}, 0x28) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000540)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad5357423b08db538753bcf550f05d219f8c6ca03228dd8d293261ba071190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x67}, {&(0x7f00000003c0)="b1252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d81b53e3fce25735962003d59c73b5c7e008a287d2a1d4", 0x30}, {&(0x7f0000000700)="c2e03ca050ae6e9864a1798b5cc6822a6179ef8da5cd850e45cd71cd4dfe222335695c1aa33ed46d46bd8b2e6cad6ddcf596", 0x32}], 0x3) write$binfmt_script(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321200a2b17fba1699743876915922a9b66379e3db9e87b4b111e61d10e475ceb2401dc75c2b57e1d384bfe3042c49ef9134937af481f2bb3c35f0b8810707ef1daccbc1048b2c20b884e0efb76d2659a715f3b513e331597c9d3c9afed9390b357d0744ddc020aedf819000000000000000832ff0769dea9ed32487d2bf1acafcf98d817857774004608d6090000000000000000009755979c72f645e9898fb9d61b0ec3a669af77550098323d175d496bc736e0843fde3877a7d07a7be821336af2980f41d32816"], 0xc9) sendmmsg$inet(r1, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="8c", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") 23:23:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r1, &(0x7f0000000380)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="8c", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet(r1, &(0x7f0000000000)='\f', 0x1, 0xcc71e8faac127257, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005d00)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000005c0)=""/166, 0xa6}], 0x1}}], 0x8, 0x0, 0x0) 23:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 294.604413][T11549] IPVS: ftp: loaded support on port[0] = 21 23:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) sendmmsg(0xffffffffffffffff, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 294.778343][T11549] chnl_net:caif_netlink_parms(): no params data found 23:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) sendmmsg(0xffffffffffffffff, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 294.894582][T11549] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.901838][T11549] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.910577][T11549] device bridge_slave_0 entered promiscuous mode 23:23:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) sendmmsg(0xffffffffffffffff, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 294.943230][T11549] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.951064][T11549] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.959977][T11549] device bridge_slave_1 entered promiscuous mode [ 295.050525][T11549] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 295.070461][T11549] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:23:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 295.103289][T11549] team0: Port device team_slave_0 added [ 295.112424][T11549] team0: Port device team_slave_1 added [ 295.207154][T11549] device hsr_slave_0 entered promiscuous mode [ 295.244019][T11549] device hsr_slave_1 entered promiscuous mode [ 295.372560][T11549] debugfs: Directory 'hsr0' with parent '/' already present! 23:23:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 295.432164][T11549] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.439550][T11549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.447366][T11549] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.454609][T11549] bridge0: port 1(bridge_slave_0) entered forwarding state 23:23:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 295.659803][T11549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.698949][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.718232][ T30] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.740363][ T30] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.753083][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 295.775794][T11549] 8021q: adding VLAN 0 to HW filter on device team0 [ 295.790270][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.800768][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.809806][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.817040][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.880263][T11549] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 295.891168][T11549] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 295.906081][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.915907][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.924908][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.932102][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.940697][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 295.950814][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 295.960846][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 295.970702][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.980085][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 295.991000][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 296.000614][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 296.009719][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.019259][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 296.028320][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.042871][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 296.052595][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.098079][T11549] 8021q: adding VLAN 0 to HW filter on device batadv0 23:23:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="6000000024000705000000004000000000000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000007000100667100003400020008000c000000000008000900000000000800020000000000080008000200000008000100000000000800070000000000"], 0x60}}, 0x0) 23:23:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x3b, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) close(r1) 23:23:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:53 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) utimensat(r0, 0x0, &(0x7f0000000080)={{0x0, 0x3ffffffe}, {0x77359400}}, 0x0) write$FUSE_POLL(r0, &(0x7f0000000040)={0x18}, 0x18) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') ioctl$CAPI_GET_MANUFACTURER(r2, 0xc0044306, 0x0) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f0000003300)=0x2) listen(r1, 0x6) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000000000241fcc611d683a2e440000001a00000000000000609346fbc2d5bdbf0a08fb2fb2d0b38dc02aa1daffee1c8ca57751dbfcf705f8704e666b9108", @ANYRES32=r6, @ANYBLOB="00000000f1ffffff0000000008000100687462001c000200180002000300"/48], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000017c0)=ANY=[@ANYBLOB="240000002a001fff00"/20, @ANYRES32=r6, @ANYBLOB="00006fc9b7e7204f1456324789330f5484f4a1ee6bd444"], 0x24}}, 0x0) r7 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) 23:23:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 296.652244][T11599] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 23:23:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 296.696444][T11603] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 23:23:53 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:53 executing program 1: syz_usb_connect(0x0, 0x36, &(0x7f00000001c0)=ANY=[@ANYBLOB="1201000014da2108ab12a190eb1e00000a010902240001000000000904410002ff5d010009050f1f00ff0700000905830300911b00000000056b34369a096408c5be6afefd5e250cc0ef6607ba5c7feb89ffe80c6a2a8ecbb174e3b41eca9da275d6f81a1c2b369da98b6cfb174f0256f38d2fab2cba00e8997bf2650d0fca2786dccfc3ccc0d29b9ff7"], 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') sendfile(r0, r1, 0x0, 0x80000002) sendmsg$nl_generic(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x4c, 0x2e, 0x4, 0x70bd2c, 0x25dfdbfd, {0xb}, [@generic="5e5fd43080454d26eca948c1ae7f7bdfb7938a5c849c61946d68a19a46d2250a02ef32d4b339184888254a476dfb156b02f5e0a0e4"]}, 0x4c}, 0x1, 0x0, 0x0, 0x8805}, 0x80) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xea, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000280)={0x15, 0x35b, 0x0}) r2 = syz_open_dev$hidraw(0x0, 0x0, 0x107d) r3 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000000100)={0x50, 0xffffffff, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) write$hidraw(r2, &(0x7f00000000c0)="047bc0e9eb4465d225fb59c36f17e9445f68550760033d3276a8b0239199b76c4194881d81d94ba7d9c7637f87613ae5156ac2302f1dfd94b834c5baead970fe4e563b3c144f22c41579858b877f", 0x364) r4 = socket(0x10, 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') sendfile(r4, r5, 0x0, 0x80000002) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$UI_DEV_SETUP(r5, 0x405c5503, &(0x7f0000000380)={{0x407d, 0x5, 0x20, 0x6}, 'syz1\x00', 0x49}) 23:23:54 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:54 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:54 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:54 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 297.224376][ T12] usb 2-1: new high-speed USB device number 2 using dummy_hcd 23:23:54 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 297.463308][ T12] usb 2-1: Using ep0 maxpacket: 8 23:23:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 297.583616][ T12] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 297.591914][ T12] usb 2-1: config 0 has no interface number 0 [ 297.598237][ T12] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1792, setting to 1024 [ 297.610745][ T12] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 27, changing to 8 23:23:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 297.723794][ T12] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 297.733295][ T12] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=10 [ 297.741468][ T12] usb 2-1: SerialNumber: syz [ 297.757963][ T12] usb 2-1: config 0 descriptor?? [ 297.810391][ T12] input: Generic X-Box pad as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.65/input/input5 23:23:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 298.025485][ T30] usb 2-1: USB disconnect, device number 2 [ 298.042603][ C0] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 298.051447][ T30] xpad 2-1:0.65: xpad_try_sending_next_out_packet - usb_submit_urb failed with result -19 23:23:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 298.073346][ T30] xpad 2-1:0.65: xpad_try_sending_next_out_packet - usb_submit_urb failed with result -19 [ 298.992568][ T30] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 299.242574][ T30] usb 2-1: Using ep0 maxpacket: 8 [ 299.363138][ T30] usb 2-1: config 0 has an invalid interface number: 65 but max is 0 [ 299.371426][ T30] usb 2-1: config 0 has no interface number 0 [ 299.378703][ T30] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1792, setting to 1024 [ 299.389966][ T30] usb 2-1: config 0 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 27, changing to 8 [ 299.483655][ T30] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a1, bcdDevice=1e.eb [ 299.493084][ T30] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=10 [ 299.501303][ T30] usb 2-1: SerialNumber: syz [ 299.509242][ T30] usb 2-1: config 0 descriptor?? [ 299.559387][ T30] input: Generic X-Box pad as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.65/input/input6 [ 299.765313][ T30] usb 2-1: USB disconnect, device number 3 [ 299.792650][ C1] xpad 2-1:0.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 299.801914][ T30] xpad 2-1:0.65: xpad_try_sending_next_out_packet - usb_submit_urb failed with result -19 23:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e", 0x24}], 0x1}, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x10001, 0x8000) ioctl$IMDELTIMER(r2, 0x80044941, &(0x7f0000000040)=0x3) 23:23:57 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x8000, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) write$FUSE_POLL(r0, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, 0x8, {0x72a4}}, 0x18) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0x3, @local, 0x2}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000001c0)={r2, 0xf801, 0x6f, "badcd1377eea673ae0f7bd2ac8d8d75d4a921d54badcae9b75489b70e40405394b7ab371157be877aa9800c05a03752fd3e4429713eb5b9c667e8b616ea7368fb78617a752e2e67a10fce90cd20a95a7d244bc3ed444f80a4132d7fff9bd9fc9a805f33f15a4b14b4753fdaf415792"}, 0x77) r3 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000280), &(0x7f00000002c0)=0x4) prctl$PR_GET_FP_MODE(0x2e) r4 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r4, 0x10f, 0x83, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000440)={0x0, 0x0, 0xffffffffffffffff}) fcntl$addseals(r5, 0x409, 0xd) syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0x9d, 0x41) set_tid_address(&(0x7f00000004c0)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0xa) r6 = syz_open_dev$media(&(0x7f0000000500)='/dev/media#\x00', 0x80, 0x8082) write$P9_RLCREATE(r6, &(0x7f0000000540)={0x18, 0xf, 0x2, {{0x4, 0x0, 0x7}, 0x8}}, 0x18) r7 = syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0xfff, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r7, 0xc0485661, &(0x7f00000005c0)={0x2, 0x1, @stop_pts=0x20}) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640)='/dev/hwrng\x00', 0x200404, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r8, 0x84, 0x65, &(0x7f0000000680)=[@in6={0xa, 0x4e21, 0x934, @loopback, 0x2}, @in6={0xa, 0x4e20, 0xffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, @in={0x2, 0x4e24, @rand_addr=0x2}], 0x48) r9 = creat(&(0x7f0000000700)='./file0\x00', 0x80) ioctl$USBDEVFS_CLEAR_HALT(r9, 0x80045515, &(0x7f0000000740)={0x1, 0x1}) rt_sigtimedwait(&(0x7f0000000780)={0x401}, &(0x7f00000007c0), &(0x7f0000000840)={0x0, 0x1c9c380}, 0x8) r10 = fanotify_init(0x0, 0x2) fchdir(r10) r11 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x100000) ioctl$FIBMAP(r11, 0x1, &(0x7f0000000880)=0x18) r12 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$SG_GET_RESERVED_SIZE(r12, 0x2272, &(0x7f0000000900)) 23:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:57 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') sendfile(r0, r1, 0x0, 0x80000002) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bridge0\x00', {0x2, 0x4e20, @empty}}) r2 = socket(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') sendfile(r2, r3, 0x0, 0x80000002) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r6}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r6, 0x1, 0xfc, 0x101, 0xe258, 0x10000}, &(0x7f0000000100)=0x14) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x40000, 0x0) accept(r7, &(0x7f0000000180)=@tipc, &(0x7f0000000200)=0x80) socket(0x4, 0xfadae1de0eca1fff, 0x65) socketpair$tipc(0x1e, 0xa10eb937b6de12b3, 0x0, &(0x7f0000000040)) 23:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) socket$kcm(0x2, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='veth0_to_team\x00', 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 23:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:23:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x8, 0x1, 0x6, 0x8, 0x2c, 0x1, 0x1, 0xc9, 0x20, 0xcc, 0x6}, 0xb) unshare(0x40000400) 23:23:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 301.035672][T11679] IPVS: ftp: loaded support on port[0] = 21 [ 301.082913][T11681] IPVS: ftp: loaded support on port[0] = 21 23:23:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 301.269333][T11689] IPVS: ftp: loaded support on port[0] = 21 23:23:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 301.327267][T11679] chnl_net:caif_netlink_parms(): no params data found 23:23:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3fc0) sendmsg$unix(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x1a402, 0x0) r2 = socket(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000002) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x1f, 0x20, 0x7a2, 0x1c}, &(0x7f0000000100)=0x18) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000280)={@dev, @broadcast}, &(0x7f0000000300)=0xc) r5 = socket(0x10, 0x2, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') ioctl$TUNSETLINK(r1, 0x400454cd, 0xd859eacc8e996e03) sendfile(r5, r6, 0x0, 0x80000002) socket(0x8, 0xa, 0xf9) ioctl$PPPIOCGFLAGS(r5, 0x8004745a, &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000140)={r4, 0x20}, &(0x7f00000001c0)=0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x6) [ 301.434095][T11679] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.441400][T11679] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.450342][T11679] device bridge_slave_0 entered promiscuous mode [ 301.518891][T11679] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.526705][T11679] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.536102][T11679] device bridge_slave_1 entered promiscuous mode [ 301.585299][T11679] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 301.624579][T11679] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 301.668578][T11679] team0: Port device team_slave_0 added [ 301.686686][T11679] team0: Port device team_slave_1 added [ 301.796986][T11679] device hsr_slave_0 entered promiscuous mode [ 301.944202][T11679] device hsr_slave_1 entered promiscuous mode [ 302.102512][T11679] debugfs: Directory 'hsr0' with parent '/' already present! [ 302.137513][T11679] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.145147][T11679] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.152945][T11679] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.160122][T11679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.254779][T11679] 8021q: adding VLAN 0 to HW filter on device bond0 [ 302.281931][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 302.293745][ T30] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.303677][ T30] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.318839][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 302.343345][T11679] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.355945][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 302.365605][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.374682][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.381874][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.425030][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.434641][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.444098][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.451318][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.459951][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 302.470117][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 302.480459][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 302.490277][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 302.500042][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 302.510187][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 302.531497][ T725] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 302.558697][ T725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 302.568368][ T725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 302.577546][ T725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 302.587199][ T725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 302.696529][T11679] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 302.754188][T11679] 8021q: adding VLAN 0 to HW filter on device batadv0 23:24:00 executing program 2: syz_usb_connect(0x0, 0x24, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x88, 0x22, 0xa6, 0x10, 0xfe9, 0xdb71, 0x700c, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xd1, 0x0, 0x0, 0x3b, 0x40, 0x4c}}]}}]}}, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101000, 0x0) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x11, 0x200) 23:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:24:00 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') sendfile(r0, r1, 0x0, 0x80000002) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000280)={0x1, 0x1, 0x1000, 0xe4, &(0x7f00000000c0)="c92b01a7552b9f3302b4be17f8caa7e2a8d6c61b70dd791411dae5d17cc430483566d3b7fa1206b1d0e08d18b49b622944c2b20838041a66b5cc9e178f7b4ada5f7171643b2e516b5b8cff0be6e08b1547e6223251e1fa73b3b321b07c0b18dce69a7334bcf607efcc07aae2b0cdc727d0e13041b7aeb28c75bfc02864aa0d8a0906c309740e6e05869bf8b8b40545f979dd08e41400a1c7f056400ca8dcde967dd0f95360181d32f9548583ae3d68d0171267b7ef91338afe1b5c450323291433f198101d724fd7b3341d3123c7cebd9d49c7e76a91eace3d30eb76b3675d3b60fc2b7c", 0xa3, 0x0, &(0x7f00000001c0)="ec712f7015efc4fc5a44c01d3e67e41d665340a9653af1a65ddfd6d95e8f10f8e9a64fee8225d6eb17e07f1e1687b398c6005aa3cc9d5a0ce0c7e1166bd6043371f5799cb810cac0625f050907ea562f71b697b024761e8e223fd09bd58e27f8680b8a5166d0b3daceda29d98cab9569e5ad7bfbbfca0c687980282e11dcc3a274bc444cebeea98b5d512222c019f2b084b4c419695d742b5a2fdbb0f43bc74a06a3dc"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r4 = socket(0x1e, 0x2, 0x0) recvfrom$unix(r4, &(0x7f0000000000)=""/32, 0x20, 0x0, 0x0, 0x0) tkill(r3, 0x16) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") 23:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b00") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 303.463246][ T3354] usb 3-1: new high-speed USB device number 2 using dummy_hcd 23:24:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20001, 0x1) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000040)=0x8000000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000d40)={0x0, @loopback, @initdev}, &(0x7f0000000d80)=0xc) sendmsg$can_raw(r0, &(0x7f0000000e80)={&(0x7f0000000dc0)={0x1d, r1}, 0x10, &(0x7f0000000e40)={&(0x7f0000000e00)=@can={{0x2}, 0x2, 0x2, 0x0, 0x0, "0f152c79b1fdd988"}, 0x10}, 0x1, 0x0, 0x0, 0x4008dd0}, 0x80) r2 = msgget$private(0x0, 0x284) msgrcv(r2, &(0x7f0000000ec0)={0x0, ""/156}, 0xa4, 0x3, 0x2000) pipe(&(0x7f0000000f80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000fc0)=r3, 0x4) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001000)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$sock_proto_private(r5, 0x89ea, &(0x7f0000001040)="2b33c9b0eff87347d641ddd3b2c16e7e82a0ecd1feab58e8dad37c2446ad9e5a586c5c83613f016c392df582de8a9397a5621ccec081a035b2ed2d3d076e3eff2259f035a6762a9c59ff44f4acdaf687506c0255933013ebcd3ae7568fdc260d41c595165401699dadfaa17b2b35de69f47b67ff9c06be5c7a698eb9b20399bc668ec1bf229b00f677f27a") r6 = syz_open_dev$media(&(0x7f0000001100)='/dev/media#\x00', 0x7fff, 0x40001) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000001240)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x41200800}, 0xc, &(0x7f0000001200)={&(0x7f0000001180)={0x58, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x29d}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xa7}]}, 0x58}, 0x1, 0x0, 0x0, 0x40081}, 0x4008080) r7 = msgget(0x3, 0x80) msgrcv(r7, &(0x7f0000001280)={0x0, ""/245}, 0xfd, 0xa3e5d81ca6ecca7c, 0x800) sendmsg$TIPC_NL_LINK_RESET_STATS(r3, 0xfffffffffffffffe, 0x4004000) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001380)='/dev/dlm-monitor\x00', 0x600c0, 0x0) ioctl$CAPI_CLR_FLAGS(r8, 0x80044325, &(0x7f00000013c0)=0x1) r9 = gettid() r10 = getpgrp(0xffffffffffffffff) tgkill(r9, r10, 0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000001400)={0x5, 0x208, 0x3, 0x9f0, 0x0}, &(0x7f0000001440)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000001480)={r11, 0x3ff}, &(0x7f00000014c0)=0x8) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000001500)=""/214) fchmod(r4, 0x154) msgget(0x3, 0x212) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001600)='/proc/self\x00', 0x2000, 0x0) r12 = syz_open_dev$cec(&(0x7f0000001640)='/dev/cec#\x00', 0x2, 0x2) ioctl$PPPIOCATTCHAN(r12, 0x40047438, &(0x7f0000001680)=0x1) setsockopt$TIPC_SRC_DROPPABLE(r5, 0x10f, 0x80, &(0x7f00000016c0)=0x70, 0x4) r13 = fcntl$getown(r6, 0x9) kcmp(r13, r9, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 23:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 303.713643][ T3354] usb 3-1: Using ep0 maxpacket: 16 23:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 303.863742][ T3354] usb 3-1: config 0 has an invalid interface number: 209 but max is 0 [ 303.872143][ T3354] usb 3-1: config 0 has no interface number 0 [ 303.878549][ T3354] usb 3-1: New USB device found, idVendor=0fe9, idProduct=db71, bcdDevice=70.0c [ 303.887870][ T3354] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 303.968094][ T3354] usb 3-1: config 0 descriptor?? 23:24:01 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') sendfile(r0, r1, 0x0, 0x80000002) accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000700)=@newlink={0x30, 0x10, 0x800, 0x70bd25, 0x0, {0x0, 0x0, 0x0, 0x0, 0x100}, [@IFLA_PROMISCUITY={0x8, 0x1e, 0xfffffff7}, @IFLA_LINK_NETNSID={0x0, 0x25, 0x1}]}, 0xfffffcd0}, 0x1, 0x0, 0x0, 0x8880}, 0x20000000) [ 304.019864][ T3354] dvb-usb: found a 'DViCO FusionHDTV DVB-T NANO2 w/o firmware' in warm state. [ 304.029355][ T3354] dvb-usb: bulk message failed: -22 (2/-1) 23:24:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 304.144895][ T3354] dvb-usb: will pass the complete MPEG2 transport stream to the software demuxer. [ 304.212980][ T3354] dvbdev: DVB: registering new adapter (DViCO FusionHDTV DVB-T NANO2 w/o firmware) [ 304.222666][ T3354] usb 3-1: media controller created [ 304.403532][ T3354] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. [ 304.407580][T11745] IPVS: ftp: loaded support on port[0] = 21 [ 304.522734][ T3354] cxusb: set interface failed [ 304.527517][ T3354] dvb-usb: bulk message failed: -22 (1/0) [ 304.533559][ T3354] dvb-usb: bulk message failed: -22 (3/-1) [ 304.539625][ T3354] dvb-usb: bulk message failed: -22 (3/-1) [ 304.588895][ T3354] dvb-usb: bulk message failed: -22 (3/-1) [ 304.595002][ T3354] dvb-usb: bulk message failed: -22 (3/-1) [ 304.632539][ T3354] dvb-usb: bulk message failed: -22 (3/-1) [ 304.638695][ T3354] dvb-usb: bulk message failed: -22 (5/-1) [ 304.645721][ T3354] zl10353_read_register: readreg error (reg=127, ret==-121) [ 304.653257][ T3354] dvb-usb: bulk message failed: -22 (5/-1) [ 304.659106][ T3354] mt352_read_register: readreg error (reg=127, ret==-121) [ 304.666396][ T3354] dvb-usb: no frontend was attached by 'DViCO FusionHDTV DVB-T NANO2 w/o firmware' [ 304.703403][T11745] chnl_net:caif_netlink_parms(): no params data found [ 304.771254][T11745] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.778722][T11745] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.787973][T11745] device bridge_slave_0 entered promiscuous mode [ 304.795136][ T3354] Registered IR keymap rc-dvico-portable [ 304.798895][T11745] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.801866][ T3354] rc rc0: DViCO FusionHDTV DVB-T NANO2 w/o firmware as /devices/platform/dummy_hcd.2/usb3/3-1/rc/rc0 [ 304.808703][T11745] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.820373][ T3354] input: DViCO FusionHDTV DVB-T NANO2 w/o firmware as /devices/platform/dummy_hcd.2/usb3/3-1/rc/rc0/input7 [ 304.827660][T11745] device bridge_slave_1 entered promiscuous mode [ 304.858154][ T3354] dvb-usb: schedule remote query interval to 100 msecs. [ 304.865308][ T3354] dvb-usb: bulk message failed: -22 (2/-1) [ 304.871222][ T3354] dvb-usb: bulk message failed: -22 (3/-1) [ 304.877172][ T3354] dvb-usb: DViCO FusionHDTV DVB-T NANO2 w/o firmware successfully initialized and connected. [ 304.892612][ T3354] usb 3-1: USB disconnect, device number 2 [ 304.925660][T11745] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.941399][T11745] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 305.009827][T11745] team0: Port device team_slave_0 added [ 305.056332][T11745] team0: Port device team_slave_1 added [ 305.068660][ T3354] dvb-usb: DViCO FusionHDTV DVB-T NANO2 w/o firmwa successfully deinitialized and disconnected. [ 305.171328][T11745] device hsr_slave_0 entered promiscuous mode [ 305.237805][T11745] device hsr_slave_1 entered promiscuous mode [ 305.282450][T11745] debugfs: Directory 'hsr0' with parent '/' already present! [ 305.315877][T11745] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.323163][T11745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.330910][T11745] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.338214][T11745] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.445633][ T3354] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 305.461372][T11745] 8021q: adding VLAN 0 to HW filter on device bond0 [ 305.487716][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 305.499410][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.512282][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.525710][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 305.551631][T11745] 8021q: adding VLAN 0 to HW filter on device team0 [ 305.573169][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 305.582379][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.589541][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.658517][T11745] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 305.669431][T11745] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 305.695135][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 305.704943][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.712131][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.722857][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 305.733180][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 305.742976][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 305.752855][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 305.771652][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 305.780837][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 305.792502][ T3354] usb 3-1: Using ep0 maxpacket: 16 [ 305.821952][T11745] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 305.912789][ T3354] usb 3-1: config 0 has an invalid interface number: 209 but max is 0 [ 305.921105][ T3354] usb 3-1: config 0 has no interface number 0 [ 305.927606][ T3354] usb 3-1: New USB device found, idVendor=0fe9, idProduct=db71, bcdDevice=70.0c [ 305.937418][ T3354] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 305.965001][ T3354] usb 3-1: config 0 descriptor?? [ 306.009988][ T3354] dvb-usb: found a 'DViCO FusionHDTV DVB-T NANO2 w/o firmware' in warm state. [ 306.019767][ T3354] dvb-usb: bulk message failed: -22 (2/-1) [ 306.072112][ T3354] dvb-usb: will pass the complete MPEG2 transport stream to the software demuxer. [ 306.114280][ T3354] dvbdev: DVB: registering new adapter (DViCO FusionHDTV DVB-T NANO2 w/o firmware) [ 306.124450][ T3354] usb 3-1: media controller created [ 306.165831][ T3354] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. 23:24:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x10001, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x400]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000080)=ANY=[@ANYBLOB="00ed000010"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:24:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x10, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') sendfile(r2, r3, 0x0, 0x80000002) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f0000000080)=0x5655766f4f808e9a) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x1df, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x16, 0x4}]}, 0x30}}, 0x0) 23:24:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 306.229875][ T3354] cxusb: set interface failed [ 306.234888][ T3354] dvb-usb: bulk message failed: -22 (1/0) [ 306.240831][ T3354] dvb-usb: bulk message failed: -22 (3/-1) [ 306.248485][ T3354] dvb-usb: bulk message failed: -22 (3/-1) [ 306.311724][T11757] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 306.342994][ T3354] dvb-usb: bulk message failed: -22 (3/-1) [ 306.349697][ T3354] dvb-usb: bulk message failed: -22 (3/-1) 23:24:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) [ 306.355735][T11760] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 306.433446][ T3354] dvb-usb: bulk message failed: -22 (3/-1) [ 306.439496][ T3354] dvb-usb: bulk message failed: -22 (5/-1) [ 306.446571][ T3354] zl10353_read_register: readreg error (reg=127, ret==-121) [ 306.454226][ T3354] dvb-usb: bulk message failed: -22 (5/-1) [ 306.460100][ T3354] mt352_read_register: readreg error (reg=127, ret==-121) [ 306.467793][ T3354] dvb-usb: no frontend was attached by 'DViCO FusionHDTV DVB-T NANO2 w/o firmware' 23:24:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007500)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)="ba043b0705c507416a87c8bcd8b07b97db187a55fe9de0a3e4a3f73dd35b452a4e", 0x21}], 0x1}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000001480)=[{0x10}, {0x10}, {0x10}], 0x30}}], 0x2, 0x0) 23:24:03 executing program 1: syz_usb_connect(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="120100004e99d408d8160660346c000000010902240001000000000904d9080245345a0009058f020000000000090502000000000000"], 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x1f, 0x20000) [ 306.553469][ T3354] Registered IR keymap rc-dvico-portable [ 306.560326][ T3354] rc rc0: DViCO FusionHDTV DVB-T NANO2 w/o firmware as /devices/platform/dummy_hcd.2/usb3/3-1/rc/rc0 [ 306.575102][ T3354] input: DViCO FusionHDTV DVB-T NANO2 w/o firmware as /devices/platform/dummy_hcd.2/usb3/3-1/rc/rc0/input8 23:24:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x10001, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x400]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000080)=ANY=[@ANYBLOB="00ed000010"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 306.673974][ T3354] dvb-usb: schedule remote query interval to 100 msecs. [ 306.681060][ T3354] dvb-usb: bulk message failed: -22 (2/-1) [ 306.687207][ T3354] dvb-usb: bulk message failed: -22 (3/-1) [ 306.693130][ T3354] dvb-usb: DViCO FusionHDTV DVB-T NANO2 w/o firmware successfully initialized and connected. [ 306.793808][ T17] dvb-usb: bulk message failed: -22 (1/-30591) [ 306.800027][ T17] ===================================================== [ 306.806991][ T17] BUG: KMSAN: uninit-value in dvb_usb_read_remote_control+0xf9/0x290 [ 306.815428][ T17] CPU: 1 PID: 17 Comm: kworker/1:0 Not tainted 5.3.0-rc7+ #0 [ 306.822807][ T17] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.832893][ T17] Workqueue: events dvb_usb_read_remote_control [ 306.839148][ T17] Call Trace: [ 306.842572][ T17] dump_stack+0x191/0x1f0 [ 306.846927][ T17] kmsan_report+0x13a/0x2b0 [ 306.851443][ T17] __msan_warning+0x73/0xe0 [ 306.855972][ T17] cxusb_rc_query+0x2f7/0x360 [ 306.860676][ T17] ? cxusb_bluebird_power_ctrl+0x240/0x240 [ 306.866508][ T17] ? cxusb_bluebird_power_ctrl+0x240/0x240 [ 306.872348][ T17] dvb_usb_read_remote_control+0xf9/0x290 [ 306.878091][ T17] ? legacy_dvb_usb_read_remote_control+0x790/0x790 [ 306.884723][ T17] ? legacy_dvb_usb_read_remote_control+0x790/0x790 [ 306.891342][ T17] process_one_work+0x1572/0x1ef0 [ 306.896383][ T17] worker_thread+0x111b/0x2460 [ 306.901185][ T17] kthread+0x4b5/0x4f0 [ 306.905249][ T17] ? process_one_work+0x1ef0/0x1ef0 [ 306.910454][ T17] ? kthread_blkcg+0xf0/0xf0 [ 306.915086][ T17] ret_from_fork+0x35/0x40 [ 306.919503][ T17] [ 306.921828][ T17] Local variable description: ----ircode@cxusb_rc_query [ 306.928767][ T17] Variable was created at: [ 306.933194][ T17] cxusb_rc_query+0x4d/0x360 [ 306.937786][ T17] dvb_usb_read_remote_control+0xf9/0x290 [ 306.943489][ T17] ===================================================== [ 306.950419][ T17] Disabling lock debugging due to kernel taint [ 306.956571][ T17] Kernel panic - not syncing: panic_on_warn set ... [ 306.963168][ T17] CPU: 1 PID: 17 Comm: kworker/1:0 Tainted: G B 5.3.0-rc7+ #0 [ 306.971922][ T17] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.981985][ T17] Workqueue: events dvb_usb_read_remote_control [ 306.988215][ T17] Call Trace: [ 306.991515][ T17] dump_stack+0x191/0x1f0 [ 306.995848][ T17] panic+0x3c9/0xc1e [ 306.999756][ T17] kmsan_report+0x2a2/0x2b0 [ 307.004270][ T17] __msan_warning+0x73/0xe0 [ 307.008775][ T17] cxusb_rc_query+0x2f7/0x360 [ 307.013447][ T17] ? cxusb_bluebird_power_ctrl+0x240/0x240 [ 307.019245][ T17] ? cxusb_bluebird_power_ctrl+0x240/0x240 [ 307.025066][ T17] dvb_usb_read_remote_control+0xf9/0x290 [ 307.030818][ T17] ? legacy_dvb_usb_read_remote_control+0x790/0x790 [ 307.037411][ T17] ? legacy_dvb_usb_read_remote_control+0x790/0x790 [ 307.043998][ T17] process_one_work+0x1572/0x1ef0 [ 307.049031][ T17] worker_thread+0x111b/0x2460 [ 307.053814][ T17] kthread+0x4b5/0x4f0 [ 307.057872][ T17] ? process_one_work+0x1ef0/0x1ef0 [ 307.063062][ T17] ? kthread_blkcg+0xf0/0xf0 [ 307.067661][ T17] ret_from_fork+0x35/0x40 [ 307.073625][ T17] Kernel Offset: disabled [ 307.077973][ T17] Rebooting in 86400 seconds..