x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500586510008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040a80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:28:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1058.136893][ T5219] bridge0: port 2(bridge_slave_1) entered disabled state [ 1058.144150][ T5219] bridge0: port 1(bridge_slave_0) entered disabled state 20:28:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xdd00}, 0x0) 20:28:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xde00}, 0x0) 20:28:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xdf00}, 0x0) [ 1058.466621][ T17] usb 2-1: new high-speed USB device number 48 using dummy_hcd 20:28:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xe000}, 0x0) 20:28:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xe100}, 0x0) [ 1058.699372][ T5221] bridge0: port 2(bridge_slave_1) entered disabled state [ 1058.706662][ T5221] bridge0: port 1(bridge_slave_0) entered disabled state [ 1058.736532][ T17] usb 2-1: Using ep0 maxpacket: 8 20:28:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xe200}, 0x0) [ 1058.857592][ T17] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1058.873402][ T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1058.908557][ T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1058.954508][ T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1058.992177][ T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1059.016849][ T5225] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1059.021178][ T17] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1059.029670][ T5225] bridge0: port 2(bridge_slave_1) entered blocking state [ 1059.043524][ T5225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1059.052372][ T5225] bridge0: port 1(bridge_slave_0) entered blocking state [ 1059.057111][ T17] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1059.059540][ T5225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1059.108618][ T17] usb 2-1: config 0 descriptor?? [ 1059.158527][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1059.172522][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1059.183123][ T5226] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1059.205965][ T5226] bridge0: port 2(bridge_slave_1) entered blocking state [ 1059.213176][ T5226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1059.217333][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1059.220624][ T5226] bridge0: port 1(bridge_slave_0) entered blocking state [ 1059.235565][ T5226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1059.264493][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1059.312535][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1059.340341][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1059.372178][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1059.427028][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1059.435187][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1059.457436][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1059.476451][ T17] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1059.516482][ T17] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1059.536474][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1059.556555][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1059.576558][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1059.596546][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1059.616468][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1059.636550][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1059.656575][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1059.686420][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1059.706433][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1059.756474][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1059.776606][ T17] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1059.795474][ T17] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1059.803894][ T17] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1059.826436][ T17] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1059.832864][ T17] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1059.851098][ T17] usb 2-1: USB disconnect, device number 48 [ 1060.056448][T29311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1060.064545][T29311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1060.416275][ T17] usb 2-1: new high-speed USB device number 49 using dummy_hcd [ 1060.656322][ T17] usb 2-1: Using ep0 maxpacket: 8 [ 1060.776523][ T17] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1060.784843][ T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1060.803888][ T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1060.818361][ T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1060.833485][ T17] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1060.845332][ T17] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1060.854779][ T17] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1060.870431][ T17] usb 2-1: config 0 descriptor?? [ 1060.908318][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1060.930265][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1060.944076][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1060.965341][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1060.986295][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1060.994368][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1061.011924][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1061.020160][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1061.028309][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1061.036461][ T17] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1061.047353][ T17] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1061.058846][ T17] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:28:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040b80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:28:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xe300}, 0x0) 20:28:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500006810008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1061.126250][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1061.156250][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:28:44 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r1, 0x5410, 0x0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r2, 0x5410, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r3, 0x5410, 0x0) syz_usb_connect(0x0, 0x48, &(0x7f0000000040)=ANY=[@ANYRES16=r3], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000030601080000000000270000000000000000010007000000"], 0x1c}}, 0x0) r4 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x581100, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(r5, 0x40106437, &(0x7f0000000340)={0x0, 0x100000000}) ioctl$EVIOCGREP(r4, 0x80084503, &(0x7f0000000280)=""/138) [ 1061.178463][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1061.216275][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1061.269057][ T5285] bridge0: port 2(bridge_slave_1) entered disabled state [ 1061.276486][ T5285] bridge0: port 1(bridge_slave_0) entered disabled state [ 1061.287941][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:28:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xe400}, 0x0) [ 1061.336244][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1061.356557][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1061.377879][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1061.416313][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1061.437145][ T17] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1061.476234][ T17] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1061.505615][ T17] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 20:28:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xe500}, 0x0) [ 1061.545533][ T17] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1061.580091][ T17] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1061.606278][ T17] i2400m_usb: probe of 2-1:0.0 failed with error -71 20:28:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xe600}, 0x0) [ 1061.657970][ T17] usb 2-1: USB disconnect, device number 49 20:28:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xe700}, 0x0) 20:28:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xe800}, 0x0) [ 1061.978248][ T5287] bridge0: port 2(bridge_slave_1) entered disabled state [ 1061.985709][ T5287] bridge0: port 1(bridge_slave_0) entered disabled state 20:28:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xe900}, 0x0) [ 1062.056336][ T17] usb 2-1: new high-speed USB device number 50 using dummy_hcd [ 1062.256116][ T17] usb 2-1: device descriptor read/64, error 18 [ 1062.262529][ T5290] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1062.280778][ T5290] bridge0: port 2(bridge_slave_1) entered blocking state [ 1062.291291][ T5290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1062.298761][ T5290] bridge0: port 1(bridge_slave_0) entered blocking state 20:28:45 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040c80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:28:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xea00}, 0x0) [ 1062.305851][ T5290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1062.365446][ T5294] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1062.391406][ T5294] bridge0: port 2(bridge_slave_1) entered blocking state [ 1062.398630][ T5294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1062.406108][ T5294] bridge0: port 1(bridge_slave_0) entered blocking state [ 1062.413222][ T5294] bridge0: port 1(bridge_slave_0) entered forwarding state 20:28:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500006c10008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1062.526250][ T17] usb 2-1: new high-speed USB device number 51 using dummy_hcd 20:28:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1062.614549][ T5335] bridge0: port 2(bridge_slave_1) entered disabled state [ 1062.621825][ T5335] bridge0: port 1(bridge_slave_0) entered disabled state [ 1062.736276][ T17] usb 2-1: device descriptor read/64, error 18 [ 1062.856789][ T17] usb usb2-port1: attempt power cycle [ 1062.879869][ T5337] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1062.932640][ T5337] bridge0: port 2(bridge_slave_1) entered blocking state [ 1062.941231][ T5337] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1062.954359][ T5337] bridge0: port 1(bridge_slave_0) entered blocking state [ 1062.963057][ T5337] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1063.094354][ T5339] bridge0: port 2(bridge_slave_1) entered disabled state [ 1063.101634][ T5339] bridge0: port 1(bridge_slave_0) entered disabled state [ 1063.340744][ T5342] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1063.355989][ T5342] bridge0: port 2(bridge_slave_1) entered blocking state [ 1063.365941][ T5342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1063.374030][ T5342] bridge0: port 1(bridge_slave_0) entered blocking state [ 1063.383494][ T5342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1063.413735][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1063.422842][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1063.566001][ T17] usb 2-1: new high-speed USB device number 52 using dummy_hcd [ 1063.736083][ T17] usb 2-1: device descriptor read/8, error -61 [ 1064.006020][ T17] usb 2-1: new high-speed USB device number 53 using dummy_hcd [ 1064.176004][ T17] usb 2-1: device descriptor read/8, error -61 20:28:47 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d29428d73ecbcc7cb0000010902f800010000000009040000047eb17d0009050c00000000800009058203006e000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f00000000c0)={0x815f, 0x221, 0x5, 0x80000000, 0x5, 0x2fb}) syz_usb_connect$printer(0x2, 0x2d, &(0x7f0000000340)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x40, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x1, 0xc0, 0x86, [{{0x9, 0x4, 0x0, 0x7f, 0x1, 0x7, 0x1, 0x2, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x430, 0x1f, 0x5, 0x6e}}}}}]}}]}}, &(0x7f0000000440)={0xa, &(0x7f0000000380)={0xa, 0x6, 0x110, 0x9, 0x17, 0xfc, 0x10, 0x9}, 0x5, &(0x7f00000003c0)={0x5, 0xf, 0x5}, 0x1, [{0x4, &(0x7f0000000400)=@lang_id={0x4}}]}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000280)=""/138) 20:28:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040d80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:28:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xeb00}, 0x0) 20:28:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500007410008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1064.296974][ T17] usb usb2-port1: unable to enumerate USB device [ 1064.314396][ T5358] bridge0: port 2(bridge_slave_1) entered disabled state [ 1064.321643][ T5358] bridge0: port 1(bridge_slave_0) entered disabled state 20:28:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xec00}, 0x0) 20:28:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xed00}, 0x0) 20:28:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xee00}, 0x0) [ 1064.691281][ T5360] bridge0: port 2(bridge_slave_1) entered disabled state [ 1064.698643][ T5360] bridge0: port 1(bridge_slave_0) entered disabled state [ 1064.715862][ T17] usb 2-1: new high-speed USB device number 54 using dummy_hcd 20:28:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xef00}, 0x0) [ 1064.925812][ T17] usb 2-1: device descriptor read/64, error 18 20:28:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xf000}, 0x0) 20:28:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500007a10008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1065.053654][ T5365] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1065.072577][ T5365] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.079947][ T5365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1065.088812][ T5365] bridge0: port 1(bridge_slave_0) entered blocking state [ 1065.096008][ T5365] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1065.176840][ T5367] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1065.194277][ T5367] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.201499][ T5367] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1065.209009][ T5367] bridge0: port 1(bridge_slave_0) entered blocking state [ 1065.216186][ T5367] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1065.223912][ T17] usb 2-1: new high-speed USB device number 55 using dummy_hcd [ 1065.445874][ T17] usb 2-1: device descriptor read/64, error 18 [ 1065.566071][ T17] usb usb2-port1: attempt power cycle [ 1066.216092][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1066.275634][ T17] usb 2-1: new high-speed USB device number 56 using dummy_hcd [ 1066.365750][ T17] usb 2-1: Invalid ep0 maxpacket: 41 [ 1066.515631][ T17] usb 2-1: new high-speed USB device number 57 using dummy_hcd [ 1066.605721][ T17] usb 2-1: Invalid ep0 maxpacket: 41 [ 1066.611223][ T17] usb usb2-port1: unable to enumerate USB device 20:28:50 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0xa05, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:28:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xf100}, 0x0) 20:28:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500008110008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040e80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:28:50 executing program 3: socket$kcm(0x10, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1067.343281][ T5404] bridge0: port 2(bridge_slave_1) entered disabled state [ 1067.350588][ T5404] bridge0: port 1(bridge_slave_0) entered disabled state 20:28:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xf200}, 0x0) 20:28:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xf300}, 0x0) 20:28:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xf400}, 0x0) [ 1067.685709][ T9825] usb 2-1: new high-speed USB device number 58 using dummy_hcd [ 1067.728613][ T5402] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1067.776084][ T5409] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1067.799529][ T5409] bridge0: port 2(bridge_slave_1) entered blocking state [ 1067.806901][ T5409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1067.814337][ T5409] bridge0: port 1(bridge_slave_0) entered blocking state 20:28:51 executing program 3: socket$kcm(0x10, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1067.821504][ T5409] bridge0: port 1(bridge_slave_0) entered forwarding state 20:28:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xf500}, 0x0) [ 1067.969327][ T9825] usb 2-1: Using ep0 maxpacket: 8 20:28:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108041080ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1068.000972][ T5426] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1068.115508][ T9825] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1068.142316][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1068.184416][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1068.228189][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1068.238003][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1068.247785][ T9825] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1068.257453][ T9825] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1068.267266][ T9825] usb 2-1: config 0 descriptor?? [ 1068.317996][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1068.327359][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1068.354237][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1068.394069][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1068.402269][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1068.433565][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1068.466478][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1068.474585][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1068.496728][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1068.505258][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1068.537276][ T9825] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1068.554911][ T9825] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1068.582392][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1068.615533][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1068.655562][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1068.693757][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1068.725428][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1068.755280][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1068.775391][ T9850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1068.795401][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1068.815703][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1068.845437][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1068.865351][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1068.895425][ T9825] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1068.905526][ T9825] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1068.913696][ T9825] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1068.924937][ T9825] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1068.933858][ T9825] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1068.959845][ T9825] usb 2-1: USB disconnect, device number 58 [ 1069.435274][ T9825] usb 2-1: new high-speed USB device number 59 using dummy_hcd [ 1069.675227][ T9825] usb 2-1: Using ep0 maxpacket: 8 [ 1069.795421][ T9825] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1069.803638][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1069.816538][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1069.827851][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1069.838962][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1069.849211][ T9825] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1069.859514][ T9825] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1069.870011][ T9825] usb 2-1: config 0 descriptor?? [ 1069.917251][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1069.926426][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1069.934481][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1069.965311][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1069.973385][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1069.995386][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1070.003542][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1070.013514][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1070.023450][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1070.032040][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1070.043217][ T9825] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1070.065232][ T9825] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:28:53 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0xa3, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x810}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:28:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="250019cb10008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:53 executing program 3: socket$kcm(0x10, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xf600}, 0x0) 20:28:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108041180ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1070.125213][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1070.145230][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1070.165237][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1070.205271][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1070.235351][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1070.243096][ T5467] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1070.255225][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:28:53 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xf700}, 0x0) [ 1070.335227][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1070.335466][ T5471] bridge0: port 2(bridge_slave_1) entered disabled state [ 1070.349259][ T5471] bridge0: port 1(bridge_slave_0) entered disabled state [ 1070.375914][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1070.395482][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1070.415277][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1070.445394][ T9825] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1070.462180][ T9825] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 20:28:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xf800}, 0x0) [ 1070.499221][ T9825] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1070.526089][ T9825] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1070.551139][ T9825] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1070.591632][ T9825] usb 2-1: USB disconnect, device number 59 20:28:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xf900}, 0x0) 20:28:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xfa00}, 0x0) 20:28:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108041280ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1070.845265][ T5474] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1070.854697][ T5474] bridge0: port 2(bridge_slave_1) entered blocking state [ 1070.861885][ T5474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1070.869364][ T5474] bridge0: port 1(bridge_slave_0) entered blocking state [ 1070.876643][ T5474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1070.991758][ T5485] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1070.995138][ T9825] usb 2-1: new high-speed USB device number 60 using dummy_hcd [ 1071.265170][ T9825] usb 2-1: Using ep0 maxpacket: 8 [ 1071.387168][ T9825] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1071.401246][ T9825] usb 2-1: config 0 has an invalid descriptor of length 159, skipping remainder of the config [ 1071.438442][ T9825] usb 2-1: too many endpoints for config 0 interface 0 altsetting 180: 120, using maximum allowed: 30 [ 1071.461357][ T9825] usb 2-1: config 0 interface 0 altsetting 180 has 0 endpoint descriptors, different from the interface descriptor's value: 120 [ 1071.480679][ T9825] usb 2-1: config 0 interface 0 has no altsetting 0 [ 1071.493662][ T9825] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1071.508008][ T9825] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1071.523546][ T9825] usb 2-1: config 0 descriptor?? [ 1071.815168][ T9825] usb 2-1: string descriptor 0 read error: -71 [ 1071.828954][ T9825] usb 2-1: USB disconnect, device number 60 [ 1072.565221][ T9850] usb 2-1: new high-speed USB device number 61 using dummy_hcd [ 1072.814894][ T9850] usb 2-1: Using ep0 maxpacket: 8 [ 1072.935069][ T9850] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1072.943275][ T9850] usb 2-1: config 0 has an invalid descriptor of length 159, skipping remainder of the config [ 1072.963704][ T9850] usb 2-1: too many endpoints for config 0 interface 0 altsetting 180: 120, using maximum allowed: 30 [ 1072.980053][ T9850] usb 2-1: config 0 interface 0 altsetting 180 has 0 endpoint descriptors, different from the interface descriptor's value: 120 [ 1072.997687][ T9850] usb 2-1: config 0 interface 0 has no altsetting 0 [ 1073.004385][ T9850] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1073.023090][ T9850] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1073.039333][ T9850] usb 2-1: config 0 descriptor?? 20:28:56 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000000c0)={0x7, 0x800, 0x7, 0x3, 0x37, 0x100}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000340)="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") 20:28:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xfb00}, 0x0) 20:28:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="250019cc10008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:56 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108042580ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1073.295008][ T9850] usb 2-1: string descriptor 0 read error: -71 [ 1073.332244][ T5531] bridge0: port 2(bridge_slave_1) entered disabled state [ 1073.335789][ T9850] usb 2-1: USB disconnect, device number 61 [ 1073.339519][ T5531] bridge0: port 1(bridge_slave_0) entered disabled state 20:28:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xfc00}, 0x0) 20:28:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xfd00}, 0x0) 20:28:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xfe00}, 0x0) [ 1073.707239][ T5539] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1073.725008][ T5539] bridge0: port 2(bridge_slave_1) entered blocking state [ 1073.732142][ T5539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1073.739592][ T5539] bridge0: port 1(bridge_slave_0) entered blocking state [ 1073.746905][ T5539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1073.794884][ T9850] usb 2-1: new high-speed USB device number 62 using dummy_hcd 20:28:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xff00}, 0x0) [ 1073.889100][ T5538] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. 20:28:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108044e80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1074.054985][ T9850] usb 2-1: Using ep0 maxpacket: 8 [ 1074.086702][ T5564] bridge0: port 2(bridge_slave_1) entered disabled state [ 1074.093937][ T5564] bridge0: port 1(bridge_slave_0) entered disabled state [ 1074.175866][ T9850] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1074.187583][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1074.221320][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1074.250599][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1074.278407][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1074.306149][ T9850] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1074.332690][ T9850] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1074.369106][ T9850] usb 2-1: config 0 descriptor?? [ 1074.424060][ T5567] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1074.435847][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1074.443932][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1074.460334][ T5567] bridge0: port 2(bridge_slave_1) entered blocking state [ 1074.467546][ T5567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1074.468783][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1074.474965][ T5567] bridge0: port 1(bridge_slave_0) entered blocking state [ 1074.490041][ T5567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1074.490071][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1074.506462][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1074.515136][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1074.524904][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1074.537551][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1074.547770][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1074.568578][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1074.588850][ T9850] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1074.605823][ T9850] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1074.666099][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1074.705072][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1074.714933][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1074.724879][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1074.744738][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1074.765604][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1074.785131][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1074.814849][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1074.845601][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1074.874797][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1074.904834][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1074.945017][ T9850] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1074.968277][ T9850] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1075.000625][ T9850] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1075.017422][ T9850] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1075.026753][ T9850] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1075.042704][ T9850] usb 2-1: USB disconnect, device number 62 [ 1075.564609][ T9850] usb 2-1: new high-speed USB device number 63 using dummy_hcd [ 1075.814635][ T9850] usb 2-1: Using ep0 maxpacket: 8 [ 1075.934706][ T9850] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1075.942981][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1075.955887][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1075.967250][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1075.977448][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1075.990902][ T9850] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1076.002141][ T9850] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1076.020933][ T9850] usb 2-1: config 0 descriptor?? [ 1076.076561][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1076.085704][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1076.093757][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1076.105328][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1076.113455][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1076.122325][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1076.130736][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1076.139148][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1076.147289][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1076.155451][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1076.163579][ T9850] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1076.174252][ T9850] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:28:59 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, 0x0) syz_usb_connect(0x0, 0x48, &(0x7f0000000340)=ANY=[@ANYRES64=0x0, @ANYRESDEC=r0, @ANYRESHEX=r0], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d50b07eac94d54a15907bff0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f81000a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x20008001) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000280)=""/138) 20:28:59 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="250000f010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0xffffff1f}, 0x0) 20:28:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:28:59 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4eb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1076.294810][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1076.314847][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1076.354562][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1076.384852][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1076.392976][ T5607] bridge0: port 2(bridge_slave_1) entered disabled state [ 1076.400229][ T5607] bridge0: port 1(bridge_slave_0) entered disabled state [ 1076.434554][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:28:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x2}, 0x0) [ 1076.484573][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1076.515002][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1076.544819][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:28:59 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x3}, 0x0) [ 1076.596063][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1076.624606][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1076.664552][ T9850] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1076.699233][ T9850] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 20:29:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x4}, 0x0) [ 1076.743730][ T9850] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1076.775078][ T9850] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1076.800286][ T9850] i2400m_usb: probe of 2-1:0.0 failed with error -71 20:29:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x5}, 0x0) [ 1076.873114][ T9850] usb 2-1: USB disconnect, device number 63 [ 1077.000440][ T5606] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1077.029815][ T5613] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:29:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x6}, 0x0) 20:29:00 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1077.068666][ T5613] bridge0: port 2(bridge_slave_1) entered blocking state [ 1077.077943][ T5613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1077.088883][ T5613] bridge0: port 1(bridge_slave_0) entered blocking state [ 1077.097028][ T5613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1077.297912][ T5641] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1077.314406][ T9850] usb 2-1: new high-speed USB device number 64 using dummy_hcd [ 1077.514477][ T9850] usb 2-1: device descriptor read/64, error 18 [ 1077.784389][ T9850] usb 2-1: new high-speed USB device number 65 using dummy_hcd [ 1077.974379][ T9850] usb 2-1: device descriptor read/64, error 18 [ 1078.004513][ T9772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1078.094515][ T9850] usb usb2-port1: attempt power cycle [ 1078.804318][ T9850] usb 2-1: new high-speed USB device number 66 using dummy_hcd [ 1078.974338][ T9850] usb 2-1: device descriptor read/8, error -61 [ 1079.244232][ T9850] usb 2-1: new high-speed USB device number 67 using dummy_hcd 20:29:02 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x7, 0x0, 0x1}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000340)={0x3, r1}) syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b20797a9d4e7664cd458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87e948386ada85384ce5d784b62932dfee230b9a741475cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000032601080000000000000000000000000500010007000000"], 0x1c}}, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000280)=""/138) 20:29:02 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x7}, 0x0) 20:29:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="250000000a008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:02 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdbc0b92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1079.434198][ T9850] usb 2-1: device descriptor read/8, error -71 [ 1079.491161][ T5658] bridge0: port 2(bridge_slave_1) entered disabled state [ 1079.498497][ T5658] bridge0: port 1(bridge_slave_0) entered disabled state [ 1079.554569][ T9850] usb usb2-port1: unable to enumerate USB device 20:29:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x8}, 0x0) 20:29:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x9}, 0x0) 20:29:03 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xe}, 0x0) [ 1079.873196][ T5657] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1079.924286][ T9850] usb 2-1: new high-speed USB device number 68 using dummy_hcd 20:29:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="250000000f008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:03 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb90a0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1080.192479][ T9850] usb 2-1: Using ep0 maxpacket: 8 [ 1080.335148][ T9850] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1080.351784][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1080.373764][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1080.401905][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1080.428165][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1080.450008][ T9850] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1080.468087][ T9850] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1080.503698][ T9850] usb 2-1: config 0 descriptor?? [ 1080.546272][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1080.554828][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1080.562853][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1080.587024][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1080.608585][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1080.624163][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1080.633056][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1080.649051][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1080.661931][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1080.671010][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1080.679417][ T9850] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1080.691011][ T9850] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1080.754271][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1080.774603][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1080.807214][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1080.834317][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1080.854109][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1080.874197][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1080.894061][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1080.914124][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1080.934252][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1080.954080][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1080.974042][ T9850] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1080.991293][ T9850] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1080.999695][ T9850] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1081.014060][ T9850] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1081.020402][ T9850] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1081.050313][ T9850] usb 2-1: USB disconnect, device number 68 [ 1081.663978][ T9850] usb 2-1: new high-speed USB device number 69 using dummy_hcd [ 1081.903942][ T9850] usb 2-1: Using ep0 maxpacket: 8 [ 1082.044028][ T9850] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1082.052239][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1082.071478][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1082.086906][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1082.099627][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1082.113014][ T9850] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1082.126081][ T9850] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1082.144375][ T9850] usb 2-1: config 0 descriptor?? [ 1082.196460][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1082.212747][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1082.239744][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1082.255309][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1082.263375][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1082.281240][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1082.292889][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1082.314095][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1082.323648][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1082.341665][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1082.351668][ T9850] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1082.363889][ T9850] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:29:05 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000280)=""/138) 20:29:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000210008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:05 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xf}, 0x0) 20:29:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb90f0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1082.413928][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1082.449181][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1082.494096][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1082.555969][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1082.580291][ T5722] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x60}, 0x0) 20:29:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1082.613904][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1082.644091][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000310008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb9100a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:06 executing program 3: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1082.683963][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1082.744768][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1082.774763][ T5735] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:29:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xf0}, 0x0) [ 1082.793969][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1082.815305][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1082.850780][ T5735] bridge0: port 2(bridge_slave_1) entered blocking state [ 1082.858452][ T5735] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1082.870773][ T5735] bridge0: port 1(bridge_slave_0) entered blocking state [ 1082.874504][ T9850] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1082.878882][ T5735] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1082.950085][ T9850] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1082.998508][ T9850] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1083.011573][ T5743] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1083.056152][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1083.079552][ T9850] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1083.105725][ T9850] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1083.173987][ T9850] usb 2-1: USB disconnect, device number 69 [ 1083.593987][ T9850] usb 2-1: new high-speed USB device number 70 using dummy_hcd [ 1083.883683][ T9850] usb 2-1: Using ep0 maxpacket: 8 [ 1084.013833][ T9850] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1084.022043][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1084.037811][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1084.053196][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1084.068154][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1084.080945][ T9850] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1084.093674][ T9850] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1084.111466][ T9850] usb 2-1: config 0 descriptor?? [ 1084.158244][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1084.168637][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1084.194612][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1084.202692][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1084.223718][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1084.231802][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1084.253685][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1084.262843][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1084.272441][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1084.280843][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1084.292378][ T9850] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1084.303698][ T9850] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1084.363711][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1084.383731][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1084.415470][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1084.433709][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1084.460428][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1084.483627][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1084.508683][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1084.535138][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1084.553774][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1084.573654][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1084.594738][ T9850] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1084.604551][ T9850] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1084.612698][ T9850] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1084.622050][ T9850] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1084.628563][ T9850] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1084.640135][ T9850] usb 2-1: USB disconnect, device number 70 [ 1085.143527][ T3001] usb 2-1: new high-speed USB device number 71 using dummy_hcd [ 1085.393531][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1085.534155][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1085.542359][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1085.555261][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1085.566538][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1085.577461][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1085.587632][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1085.596821][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1085.607795][ T3001] usb 2-1: config 0 descriptor?? [ 1085.665839][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1085.674364][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1085.682419][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1085.695453][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1085.703928][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1085.711979][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1085.721630][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1085.730168][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1085.753486][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1085.761557][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1085.785147][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1085.803466][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:29:09 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:29:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x300}, 0x0) 20:29:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb9250a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000410008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:09 executing program 3: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1085.881760][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1085.934932][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1085.953866][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1085.983014][ T5796] bridge0: port 2(bridge_slave_1) entered disabled state [ 1085.990325][ T5796] bridge0: port 1(bridge_slave_0) entered disabled state [ 1085.999602][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x500}, 0x0) [ 1086.033568][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1086.055521][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1086.114066][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1086.143704][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1086.173485][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1086.193556][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x600}, 0x0) [ 1086.233725][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1086.260739][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 20:29:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x700}, 0x0) [ 1086.308188][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1086.343778][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1086.373258][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1086.427629][ T3001] usb 2-1: USB disconnect, device number 71 20:29:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x900}, 0x0) [ 1086.547758][ T5798] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1086.570370][ T5802] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:29:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x9a8}, 0x0) 20:29:09 executing program 3: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1086.622505][ T5802] bridge0: port 2(bridge_slave_1) entered blocking state [ 1086.633458][ T5802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1086.646837][ T5802] bridge0: port 1(bridge_slave_0) entered blocking state [ 1086.655861][ T5802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1086.823428][ T3001] usb 2-1: new high-speed USB device number 72 using dummy_hcd [ 1086.861369][ T5830] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1087.083442][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1087.242595][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1087.251266][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1087.274169][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1087.285347][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1087.299547][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1087.309792][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1087.319617][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1087.331486][ T3001] usb 2-1: config 0 descriptor?? [ 1087.385350][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1087.394145][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1087.402214][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1087.453378][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1087.462812][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1087.472162][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1087.480323][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1087.489300][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1087.497475][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1087.505632][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1087.513774][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1087.524388][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1087.573543][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1087.611666][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1087.638169][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1087.663327][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1087.693564][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1087.723356][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1087.743293][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1087.773329][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1087.803353][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1087.823311][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1087.843392][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1087.864933][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1087.875294][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1087.887092][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1087.895160][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1087.901564][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1087.913903][ T3001] usb 2-1: USB disconnect, device number 72 [ 1088.503205][ T3001] usb 2-1: new high-speed USB device number 73 using dummy_hcd [ 1088.763161][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1088.923861][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1088.932280][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1088.942162][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1088.953319][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1088.963668][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1088.973425][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1088.982592][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1088.992223][ T3001] usb 2-1: config 0 descriptor?? [ 1089.035311][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1089.044349][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1089.052405][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1089.063962][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1089.094517][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1089.104536][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1089.112911][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:29:12 executing program 1: syz_usb_connect(0x1, 0x48, &(0x7f0000000040)=ANY=[], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000340)) 20:29:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xe00}, 0x0) 20:29:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb94e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000510008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1089.143153][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1089.155474][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1089.211976][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1089.250764][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device 20:29:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xf00}, 0x0) [ 1089.286707][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1089.322518][ T5869] bridge0: port 2(bridge_slave_1) entered disabled state [ 1089.329823][ T5869] bridge0: port 1(bridge_slave_0) entered disabled state [ 1089.346658][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1089.383898][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x6000}, 0x0) [ 1089.403243][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1089.433118][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1089.473176][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1089.503230][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xa809}, 0x0) [ 1089.553125][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1089.573257][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1089.603774][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1089.633192][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xf000}, 0x0) [ 1089.653324][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1089.669534][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1089.714178][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1089.742488][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 20:29:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xf0ffff}, 0x0) [ 1089.765836][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1089.802197][ T3001] usb 2-1: USB disconnect, device number 73 [ 1089.859273][ T5867] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1089.902377][ T5873] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1089.941651][ T5873] bridge0: port 2(bridge_slave_1) entered blocking state 20:29:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000610008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1089.952310][ T5873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1089.964852][ T5873] bridge0: port 1(bridge_slave_0) entered blocking state [ 1089.973318][ T5873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1090.324481][ T3001] usb 2-1: new low-speed USB device number 74 using dummy_hcd [ 1090.533163][ T3001] usb 2-1: device descriptor read/64, error 18 [ 1090.802941][ T3001] usb 2-1: new low-speed USB device number 75 using dummy_hcd [ 1091.003870][ T3001] usb 2-1: device descriptor read/64, error 18 [ 1091.133066][ T3001] usb usb2-port1: attempt power cycle [ 1091.862919][ T3001] usb 2-1: new low-speed USB device number 76 using dummy_hcd [ 1092.043315][ T3001] usb 2-1: device descriptor read/8, error -61 20:29:15 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000004c0), &(0x7f0000000500)=0x4) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x100, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r1, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x84, 0x1, 0x7, 0x5, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x200}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER={0x4c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x3ff}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xfffffffc}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xda4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x5}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x3}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xc000000}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7ff}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x7}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4}, 0x10) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000003ef0108000000000000000000000000050001000700ac00"], 0x1c}}, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000280)=""/138) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="dc000000", @ANYRES16=r5, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r7, @ANYBLOB="08009e00000d000080008480080002000900000008000200000000000a0005004b82012c996200000a000500ffffffffffff0000340006800800000000000000080001000600000008000200000000000800020000000000080001000001000008000200910000000a000500b074a652944700000a0001000202020202020000080902000300000038007d"], 0xdc}}, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r3, &(0x7f0000000c00)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000bc0)={&(0x7f00000005c0)={0x5dc, r5, 0x200, 0x70bd28, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_FRAME={0x59a, 0x33, @data_frame={@no_qos=@type00={{0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, {0x6}, @device_b, @broadcast, @initial, {0xb, 0x2}}, @random="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"}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x5dc}, 0x1, 0x0, 0x0, 0x4080}, 0x8890) ioctl$SNDCTL_SEQ_TESTMIDI(r2, 0x40045108, &(0x7f0000000540)=0x8000) 20:29:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x1000000}, 0x0) 20:29:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb9c00a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000710008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1092.312831][ T5920] bridge0: port 2(bridge_slave_1) entered disabled state [ 1092.320065][ T5920] bridge0: port 1(bridge_slave_0) entered disabled state 20:29:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x2000000}, 0x0) 20:29:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x3000000}, 0x0) 20:29:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x4000000}, 0x0) [ 1092.661231][ T5922] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1092.714195][ T5926] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:29:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e02480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1092.763298][ T5926] bridge0: port 2(bridge_slave_1) entered blocking state [ 1092.774469][ T5926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1092.790912][ T5926] bridge0: port 1(bridge_slave_0) entered blocking state [ 1092.798618][ T5926] bridge0: port 1(bridge_slave_0) entered forwarding state 20:29:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000810008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1092.912752][ T3001] usb 2-1: new high-speed USB device number 77 using dummy_hcd [ 1092.948766][ T5942] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1093.013762][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1093.143385][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1093.151644][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1093.186041][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1093.216023][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1093.236384][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1093.262651][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1093.271871][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1093.307390][ T3001] usb 2-1: config 0 descriptor?? [ 1093.363770][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1093.371853][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1093.417011][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1093.450882][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1093.470556][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1093.483518][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1093.509913][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1093.529391][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1093.553971][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1093.594200][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1093.602280][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1093.660884][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1093.702782][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1093.722868][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1093.742730][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1093.750529][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1093.772857][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1093.794880][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1093.812793][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1093.842699][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1093.872645][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1093.902894][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1093.922701][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1093.942728][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1093.952614][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1093.960763][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1093.982753][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1093.989180][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1094.002352][ T3001] usb 2-1: USB disconnect, device number 77 [ 1094.612576][ T3001] usb 2-1: new high-speed USB device number 78 using dummy_hcd [ 1094.882551][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1095.025809][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1095.034657][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1095.053517][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1095.064750][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1095.074716][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1095.084892][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1095.094638][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1095.108873][ T3001] usb 2-1: config 0 descriptor?? [ 1095.164635][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1095.173820][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1095.181988][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1095.193337][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1095.202098][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1095.210309][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1095.219986][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1095.235879][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1095.256225][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1095.272500][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1095.288745][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1095.312483][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:29:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x5000000}, 0x0) 20:29:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e03480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000910008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1095.373790][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1095.402601][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1095.432146][ T5984] bridge0: port 2(bridge_slave_1) entered disabled state [ 1095.439447][ T5984] bridge0: port 1(bridge_slave_0) entered disabled state [ 1095.452546][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1095.502621][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x6000000}, 0x0) [ 1095.552586][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1095.592443][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1095.612753][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1095.642491][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1095.674143][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1095.702490][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x7000000}, 0x0) [ 1095.734072][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1095.767245][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 20:29:19 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113000ec344573993fd000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000003c0)={0x14, r1, 0x31905e13403123b7, 0x0, 0x0, {0x5, 0x0, 0xf000}}, 0x14}, 0x1, 0x50000}, 0x0) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xfffffffffffffe0f, r1, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x0, 0x34, 0x10001}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x0, 0x2f, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000280)=""/138) [ 1095.806873][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1095.837312][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1095.862226][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1095.896407][ T3001] usb 2-1: USB disconnect, device number 78 20:29:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x8000000}, 0x0) [ 1096.031115][ T5987] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1096.070034][ T5989] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1096.117282][ T5989] bridge0: port 2(bridge_slave_1) entered blocking state [ 1096.128405][ T5989] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1096.146485][ T5989] bridge0: port 1(bridge_slave_0) entered blocking state [ 1096.159629][ T5989] bridge0: port 1(bridge_slave_0) entered forwarding state 20:29:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x9000000}, 0x0) 20:29:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e04480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1096.338684][ T6013] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000a10008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1096.382413][ T3001] usb 2-1: new high-speed USB device number 79 using dummy_hcd 20:29:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xe000000}, 0x0) 20:29:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e05480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1096.589054][ T6023] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000c10008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1096.632301][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1096.638956][ T6028] bridge0: port 2(bridge_slave_1) entered disabled state [ 1096.646235][ T6028] bridge0: port 1(bridge_slave_0) entered disabled state 20:29:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xf000000}, 0x0) [ 1096.762514][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1096.790948][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1096.856352][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1096.904985][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1096.945543][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1096.986216][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1097.020919][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1097.046161][ T3001] usb 2-1: config 0 descriptor?? [ 1097.101450][ T6030] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1097.114325][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1097.128222][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1097.129097][ T6030] bridge0: port 2(bridge_slave_1) entered blocking state [ 1097.145891][ T6030] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1097.162008][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1097.162300][ T6030] bridge0: port 1(bridge_slave_0) entered blocking state [ 1097.179823][ T6030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1097.191203][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1097.238240][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1097.266825][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1097.340383][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1097.392732][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1097.429679][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1097.437856][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1097.446776][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1097.454914][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1097.465671][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1097.492570][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1097.522333][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1097.542271][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1097.572448][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1097.592420][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1097.622372][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1097.642301][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1097.662240][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1097.682276][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1097.712774][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1097.742345][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1097.752263][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1097.760434][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1097.802335][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1097.808712][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1097.870132][ T3001] usb 2-1: USB disconnect, device number 79 [ 1098.312134][ T3001] usb 2-1: new high-speed USB device number 80 using dummy_hcd [ 1098.572184][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1098.702273][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1098.710508][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1098.731395][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1098.746990][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1098.759693][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid maxpacket 1121, setting to 64 [ 1098.774904][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1098.788732][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1098.801209][ T3001] usb 2-1: config 0 descriptor?? [ 1098.864141][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1098.873348][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1098.881415][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:29:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x60000000}, 0x0) 20:29:22 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e06480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:22 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000fa0501080000000000010000000000000500018007000000"], 0x1c}}, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl2\x00', &(0x7f0000000340)={'sit0\x00', 0x0, 0x29, 0x10, 0x5, 0x6, 0x40, @remote, @mcast2, 0x7, 0x7, 0x2, 0x9a}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)=ANY=[@ANYBLOB="21180100", @ANYRES16=0x0, @ANYBLOB="00062cbd7000fddbdf251100000060000180080003000100000008000300020000001400020076657468305f766972745f7769666900140002006261746164765f736c6176655f300000080003000100000014000200626174616476300000000000000000000800030002000000640001801400020076657468305f766c616e000000000000140002006d61637674617030000000000000000008000300020000000800030001000000140002007767310000000000000000000000000014000200776731000000000000000000000000004000018008000300010000000800030003000000080003000300000008000100", @ANYRES32=r1, @ANYBLOB="14000200776c616e3000000000000000000000000800030003000000"], 0x118}, 0x1, 0x0, 0x0, 0x4}, 0x44) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$VIDIOC_ENUM_FMT(r2, 0xc0405602, &(0x7f00000005c0)={0x3, 0xa, 0x3, "aa9305406a2030618bf07080d40c29cb726b06527a42c8953cd8b98614f1aabb", 0x2036315a}) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000280)=""/169) 20:29:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000e10008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1098.912732][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1098.920798][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1098.990855][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1099.008364][ T6078] bridge0: port 2(bridge_slave_1) entered disabled state [ 1099.015636][ T6078] bridge0: port 1(bridge_slave_0) entered disabled state 20:29:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x9effffff}, 0x0) [ 1099.039302][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1099.059866][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1099.078199][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1099.100585][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1099.118658][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1099.146111][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1099.182244][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xa8090000}, 0x0) [ 1099.232118][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1099.272340][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1099.292494][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1099.332198][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1099.362326][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xf0ffffff}, 0x0) [ 1099.402096][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1099.433432][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1099.472119][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1099.498384][ T6088] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1099.511252][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xf5ffffff}, 0x0) [ 1099.531975][ T6088] bridge0: port 2(bridge_slave_1) entered blocking state [ 1099.539218][ T6088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1099.546683][ T6088] bridge0: port 1(bridge_slave_0) entered blocking state [ 1099.553850][ T6088] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1099.564504][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1099.586051][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1099.611509][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1099.632647][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1099.647759][ T6089] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1099.658621][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 20:29:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xfcffffff}, 0x0) 20:29:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e07480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500001010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1099.756051][ T3001] usb 2-1: USB disconnect, device number 80 20:29:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:23 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xfffff000}, 0x0) [ 1100.060367][ T6119] bridge0: port 2(bridge_slave_1) entered disabled state [ 1100.067674][ T6119] bridge0: port 1(bridge_slave_0) entered disabled state [ 1100.231951][ T3001] usb 2-1: new high-speed USB device number 81 using dummy_hcd [ 1100.375545][ T6117] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1100.405566][ T6122] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1100.447194][ T6122] bridge0: port 2(bridge_slave_1) entered blocking state [ 1100.456814][ T6122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1100.470218][ T6122] bridge0: port 1(bridge_slave_0) entered blocking state [ 1100.478998][ T6122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1100.531936][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1100.631728][ T9529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1100.682555][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1100.702876][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1100.725587][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1100.751849][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1100.761636][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1100.776384][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1100.786318][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1100.829314][ T3001] usb 2-1: config 0 descriptor?? [ 1100.874647][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1100.883400][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1100.891450][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1100.902945][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1100.911134][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1100.920504][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1100.929378][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1100.937818][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1100.951411][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1100.962335][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1100.970397][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1100.990036][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1101.103637][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1101.131896][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1101.151920][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1101.172038][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1101.191884][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1101.213527][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1101.241922][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1101.263281][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1101.291866][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1101.311902][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1101.333700][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1101.343583][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1101.358935][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1101.368290][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1101.374975][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1101.388018][ T3001] usb 2-1: USB disconnect, device number 81 [ 1101.971772][ T3001] usb 2-1: new high-speed USB device number 82 using dummy_hcd [ 1102.213548][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1102.331790][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1102.340095][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1102.349874][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1102.361007][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1102.370778][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1102.380753][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1102.389931][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1102.400748][ T3001] usb 2-1: config 0 descriptor?? [ 1102.443848][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1102.452607][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1102.460667][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1102.483309][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1102.491381][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1102.512084][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1102.520180][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1102.551782][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1102.559854][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1102.574220][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1102.582439][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1102.593261][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:29:25 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e1f, 0x400, @private1, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) getpeername$tipc(r1, &(0x7f0000001840)=@name, &(0x7f0000001880)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) sendmsg$rds(r0, &(0x7f0000001800)={&(0x7f00000000c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000180)=""/77, 0x4d}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2, &(0x7f0000001640)=[@fadd={0x58, 0x114, 0x6, {{0x0, 0x4}, &(0x7f0000000240)=0x5, &(0x7f0000001340)=0xbaa1, 0x80000000, 0x0, 0x80000001, 0x9, 0x40, 0x4}}, @fadd={0x58, 0x114, 0x6, {{0x15a, 0x6}, &(0x7f0000001380)=0x9, &(0x7f00000013c0)=0x37, 0x2, 0xffffffff, 0x1, 0x9, 0x1e, 0x100}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000001400)=""/234, 0xea}, &(0x7f0000001500), 0x10}}, @mask_cswp={0x58, 0x114, 0x9, {{0x2, 0x1}, &(0x7f0000001540)=0x1, &(0x7f0000001580)=0x9, 0x1, 0x7, 0x3, 0x7, 0x28}}, @rdma_dest={0x18, 0x114, 0x2, {0x1f, 0x4}}, @fadd={0x58, 0x114, 0x6, {{0x1ff, 0x2}, &(0x7f00000015c0)=0x26, &(0x7f0000001600)=0x2, 0xffffffffffffffff, 0x516, 0x2c48, 0x4e969cd4, 0x2, 0xfe}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x4}], 0x1c0, 0x1}, 0x24000040) syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000280)=""/138) 20:29:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xffffff7f}, 0x0) 20:29:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500004810008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e08480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1102.611770][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1102.631731][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1102.651714][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1102.701725][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1102.759219][ T6167] bridge0: port 2(bridge_slave_1) entered disabled state [ 1102.766555][ T6167] bridge0: port 1(bridge_slave_0) entered disabled state [ 1102.775318][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xffffff9e}, 0x0) [ 1102.823801][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1102.851801][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1102.871877][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1102.891746][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1102.911683][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xfffffff0}, 0x0) [ 1102.942499][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1102.975105][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1103.008721][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1103.040585][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 20:29:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xfffffff5}, 0x0) [ 1103.061927][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1103.087222][ T3001] usb 2-1: USB disconnect, device number 82 20:29:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xfffffffc}, 0x0) [ 1103.262216][ T6170] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1103.293603][ T6170] bridge0: port 2(bridge_slave_1) entered blocking state [ 1103.301567][ T6170] bridge0: port 2(bridge_slave_1) entered forwarding state 20:29:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500004c10008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1103.319532][ T6170] bridge0: port 1(bridge_slave_0) entered blocking state [ 1103.331259][ T6170] bridge0: port 1(bridge_slave_0) entered forwarding state 20:29:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0b480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1103.471740][ T3001] usb 2-1: new high-speed USB device number 83 using dummy_hcd [ 1103.500053][ T6166] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1103.721711][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1103.866281][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1103.879428][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1103.901911][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1103.925044][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1103.946796][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1103.968426][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1103.989789][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1104.011058][ T3001] usb 2-1: config 0 descriptor?? [ 1104.055000][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1104.070706][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1104.092196][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1104.139727][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1104.177635][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1104.214075][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1104.235393][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1104.283274][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1104.312702][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1104.320787][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1104.347286][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1104.371155][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1104.410339][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1104.431991][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1104.451764][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1104.481685][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1104.502365][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1104.521522][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1104.541534][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1104.561505][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1104.581552][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1104.602090][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1104.622409][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1104.633440][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1104.642104][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1104.649620][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1104.656333][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1104.668567][ T3001] usb 2-1: USB disconnect, device number 83 [ 1105.172289][ T3001] usb 2-1: new high-speed USB device number 84 using dummy_hcd [ 1105.412566][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1105.531478][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1105.539691][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1105.553178][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1105.564555][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1105.574789][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1105.585568][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1105.595171][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1105.610246][ T3001] usb 2-1: config 0 descriptor?? [ 1105.653182][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1105.663302][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1105.672452][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1105.680506][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1105.705666][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1105.728594][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1105.751381][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1105.759457][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1105.769603][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1105.782972][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:29:29 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ecfcffffff944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87ace5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:29:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xf0ffffffffffff}, 0x0) 20:29:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0c480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1105.801911][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1105.822508][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:29:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500006010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1105.871505][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1105.924468][ T6237] bridge0: port 2(bridge_slave_1) entered disabled state [ 1105.931486][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1105.931709][ T6237] bridge0: port 1(bridge_slave_0) entered disabled state [ 1105.971464][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x100000000000000}, 0x0) [ 1106.011742][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1106.064317][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1106.101581][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1106.133717][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1106.161369][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x200000000000000}, 0x0) [ 1106.191566][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1106.221647][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1106.261562][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1106.315811][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1106.362683][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 20:29:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x300000000000000}, 0x0) [ 1106.406702][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1106.435805][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1106.491123][ T3001] usb 2-1: USB disconnect, device number 84 20:29:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x400000000000000}, 0x0) [ 1106.699502][ T6236] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1106.730490][ T6243] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1106.758527][ T6243] bridge0: port 2(bridge_slave_1) entered blocking state [ 1106.765760][ T6243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1106.773235][ T6243] bridge0: port 1(bridge_slave_0) entered blocking state [ 1106.780349][ T6243] bridge0: port 1(bridge_slave_0) entered forwarding state 20:29:30 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x500000000000000}, 0x0) 20:29:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1106.901423][ T3001] usb 2-1: new high-speed USB device number 85 using dummy_hcd [ 1106.974427][ T6271] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1107.161184][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1107.281277][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1107.309908][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1107.345124][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1107.381166][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1107.391770][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1107.402660][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1107.417100][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1107.437356][ T3001] usb 2-1: config 0 descriptor?? [ 1107.483227][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1107.497334][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1107.518026][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1107.553067][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1107.578479][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1107.599046][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1107.622606][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1107.672431][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1107.711256][ T9772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1107.717638][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1107.751179][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1107.772662][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1107.790160][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1107.811329][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1107.841438][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1107.861296][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1107.881278][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1107.901194][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1107.921162][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1107.941224][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1107.961206][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1107.981200][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1108.001302][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1108.021912][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1108.031881][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1108.040123][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1108.051390][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1108.060577][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1108.072274][ T3001] usb 2-1: USB disconnect, device number 85 [ 1108.581066][ T3001] usb 2-1: new high-speed USB device number 86 using dummy_hcd [ 1108.821055][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1108.941068][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1108.949339][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1108.959107][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1108.974577][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1108.986714][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1108.997087][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1109.008424][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1109.021549][ T3001] usb 2-1: config 0 descriptor?? [ 1109.063145][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1109.074682][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1109.082865][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1109.092495][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1109.109050][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1109.129137][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1109.144570][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1109.166289][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1109.179234][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1109.187673][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1109.196166][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1109.207125][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:29:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0d480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500006810008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x600000000000000}, 0x0) 20:29:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1109.271072][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1109.291068][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1109.311038][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:32 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000980)={0x14c, r2, 0x100, 0x0, 0x0, {0x8}, [@TIPC_NLA_LINK={0xa4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4, 0x4}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4331a23b}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6930}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3f}]}, @TIPC_NLA_BEARER={0x60, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x80000000, @private1}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcc62}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1000}]}]}, 0x14c}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000800)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000340)={0x45c, r2, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x11d2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffeff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb95}]}]}, @TIPC_NLA_LINK={0x50, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}]}, @TIPC_NLA_NODE={0x104, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xff, 0x3, "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"}]}, @TIPC_NLA_LINK={0x88, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'netpci0\x00'}}]}, @TIPC_NLA_NODE={0x1f0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ID={0xc0, 0x3, "2f7543fce81b7a857518673916faa2ad76da7beb9561031be1c16464165522dc697790ad85b7346efad79136229a4c18ac9bc849bd6f18e2e5879fb8e70976f275fe239e4fe1a8380731010138195875d13dbfcd8214fdf42976e6ade5a31a5bfde268fd2bf12af1ab5caacc899b00c899e4d03651de571f6129758153b7ec2cf1c3df59c0f43a5fd24183f7149c6a923baa5ddb01a67631ad70169c406314bd888845317b72033475513979677ab9bba2cb183a8ebaacde9f4120b6"}, @TIPC_NLA_NODE_ID={0xb5, 0x3, "cc3a56491a6a82135dc3b14132d8bb39bd8e0c470d9dbae5d37f5373c728f906d7449966917bc2c8ae87fd62d2332debee78c1e654d76c5bd7873083ab210f6e1425e4f81392babd879499d17264bb707b3d7e85ed67b058f7a0587b8d49ed25b43597aea52f09cf80fc17d7ad8dc043adce3331a33275cf7c2827860728da980dac60a43d82ec5a8270a439dae4bda87b9a5dac444c816f1cea47bbb62d64b2fd5c63e7dd39380d3a62e39090dd0e935e"}, @TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "89f889631060bf4f04a14991ada2d6b6ac8622a9563f96b4eabd213f"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x4}]}, 0x45c}, 0x1, 0x0, 0x0, 0x4c000}, 0x800) [ 1109.356813][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1109.401069][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1109.408257][ T6308] bridge0: port 2(bridge_slave_1) entered disabled state [ 1109.415533][ T6308] bridge0: port 1(bridge_slave_0) entered disabled state [ 1109.455210][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x700000000000000}, 0x0) [ 1109.520979][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1109.550979][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1109.581718][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1109.601059][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1109.631116][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1109.661005][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 20:29:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x800000000000000}, 0x0) [ 1109.704570][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1109.742675][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1109.775681][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 20:29:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x900000000000000}, 0x0) [ 1109.829127][ T3001] usb 2-1: USB disconnect, device number 86 [ 1109.946153][ T6309] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1109.984664][ T6313] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:29:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xe00000000000000}, 0x0) [ 1110.060201][ T6313] bridge0: port 2(bridge_slave_1) entered blocking state [ 1110.069079][ T6313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1110.082857][ T6313] bridge0: port 1(bridge_slave_0) entered blocking state [ 1110.091573][ T6313] bridge0: port 1(bridge_slave_0) entered forwarding state 20:29:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500006c10008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0f480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:33 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xf00000000000000}, 0x0) [ 1110.230881][ T3001] usb 2-1: new high-speed USB device number 87 using dummy_hcd [ 1110.329701][ T6341] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1110.359760][ T6350] bridge0: port 2(bridge_slave_1) entered disabled state [ 1110.367073][ T6350] bridge0: port 1(bridge_slave_0) entered disabled state 20:29:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500007410008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1110.490847][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1110.611705][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1110.629004][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1110.656076][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1110.685375][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1110.728836][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1110.755032][ T6352] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1110.779245][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1110.800818][ T6352] bridge0: port 2(bridge_slave_1) entered blocking state [ 1110.810029][ T6352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1110.823048][ T6352] bridge0: port 1(bridge_slave_0) entered blocking state [ 1110.830829][ T6352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1110.882201][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1110.902314][ T3001] usb 2-1: config 0 descriptor?? [ 1110.943032][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1110.986058][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1111.074190][ T6356] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1111.087271][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1111.104269][T22389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1111.152176][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1111.160257][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1111.183804][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1111.197440][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1111.208404][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1111.227392][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1111.239569][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1111.255340][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1111.278407][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1111.320821][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1111.340834][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1111.360890][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1111.380781][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1111.400855][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1111.420789][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1111.441814][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1111.470782][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1111.490856][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1111.513064][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1111.551132][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1111.595465][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1111.630554][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1111.654916][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1111.670294][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1111.716081][ T3001] usb 2-1: USB disconnect, device number 87 [ 1112.200702][ T3001] usb 2-1: new high-speed USB device number 88 using dummy_hcd [ 1112.440642][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1112.560767][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1112.568984][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1112.585467][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1112.599686][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1112.613882][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1112.626848][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1112.638861][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1112.657215][ T3001] usb 2-1: config 0 descriptor?? [ 1112.712408][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1112.721906][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1112.729963][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1112.762573][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1112.782149][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1112.790215][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:29:36 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000000020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64150800d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dda87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900"/241], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00200031090000000000000000a93fc7f351fb1c9e01007b251402"], 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000340)={0x47, "d3f35cac26405ab15845bd4f4e6d3c8300bfb608751e60516873fb8f8ed2a38c", 0x2, 0x81, 0x2, 0x0, 0x30000, 0x2}) 20:29:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x6000000000000000}, 0x0) [ 1112.810695][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1112.834263][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1112.847652][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:29:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e10480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500007a10008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1112.865555][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1112.909312][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1112.936330][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1112.977767][ T6394] bridge0: port 2(bridge_slave_1) entered disabled state [ 1112.985063][ T6394] bridge0: port 1(bridge_slave_0) entered disabled state [ 1113.038140][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x9effffff00000000}, 0x0) [ 1113.080636][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1113.110642][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1113.140611][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1113.160970][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xa809000000000000}, 0x0) [ 1113.202283][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1113.240572][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1113.290801][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1113.320682][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1113.350732][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1113.380739][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device 20:29:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xf0ffffff00000000}, 0x0) [ 1113.408540][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1113.442038][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1113.465544][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1113.488877][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1113.513764][ T6395] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1113.549286][ T6400] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1113.560763][ T3001] usb 2-1: USB disconnect, device number 88 [ 1113.583184][ T6400] bridge0: port 2(bridge_slave_1) entered blocking state [ 1113.592089][ T6400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1113.605184][ T6400] bridge0: port 1(bridge_slave_0) entered blocking state 20:29:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xf5ffffff00000000}, 0x0) 20:29:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d0000", 0x17}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1113.614978][ T6400] bridge0: port 1(bridge_slave_0) entered forwarding state 20:29:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xfcffffff00000000}, 0x0) [ 1113.798194][ T6422] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1114.350487][ T3001] usb 2-1: new high-speed USB device number 89 using dummy_hcd [ 1114.520604][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1114.590395][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1114.710486][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1114.718819][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1114.731689][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1114.742984][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1114.754321][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1114.764190][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1114.773694][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1114.784193][ T3001] usb 2-1: config 0 descriptor?? [ 1114.822531][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1114.848631][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1114.879829][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1114.892099][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1114.900160][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1114.923556][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1114.936478][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1114.944769][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1114.952958][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1114.961206][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1114.970848][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1114.981745][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1115.047098][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1115.070504][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1115.092326][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1115.110426][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1115.130431][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1115.150438][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1115.170439][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1115.190471][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1115.210875][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1115.230452][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1115.258140][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1115.267974][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1115.285597][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1115.295601][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1115.307531][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1115.326117][ T3001] usb 2-1: USB disconnect, device number 89 [ 1115.910354][ T3001] usb 2-1: new high-speed USB device number 90 using dummy_hcd [ 1116.170357][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1116.320761][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1116.328988][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1116.342110][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1116.353080][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1116.362814][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1116.372567][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1116.382547][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1116.392791][ T3001] usb 2-1: config 0 descriptor?? [ 1116.452483][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1116.461644][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1116.469823][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1116.482071][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1116.490609][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1116.498751][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1116.507420][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1116.519237][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1116.527778][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1116.536339][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:29:39 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}], 0x18}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x800009}]}, &(0x7f0000000280)=0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000340)={'ip6_vti0\x00'}) ioctl$TUNSETCARRIER(r0, 0x800454df, &(0x7f0000000300)) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000280)=""/138) 20:29:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="250000002f008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:39 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e13480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d0000", 0x17}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:39 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xffffff7f00000000}, 0x0) [ 1116.548902][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1116.582518][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1116.660463][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1116.682751][ T6469] bridge0: port 2(bridge_slave_1) entered disabled state [ 1116.690030][ T6469] bridge0: port 1(bridge_slave_0) entered disabled state [ 1116.710346][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xffffffff00000000}, 0x0) [ 1116.787545][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1116.840296][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1116.872028][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0xfffffffffffff000}, 0x0) [ 1116.900297][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1116.930495][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1116.960240][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1117.000334][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x2}, 0x0) [ 1117.040296][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1117.080409][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1117.100341][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1117.119940][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1117.137133][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1117.154709][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1117.161024][ T6465] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1117.200595][ T6471] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1117.222692][ T3001] usb 2-1: USB disconnect, device number 90 20:29:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="250000004e008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1117.253145][ T6471] bridge0: port 2(bridge_slave_1) entered blocking state [ 1117.262564][ T6471] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1117.271169][ T6471] bridge0: port 1(bridge_slave_0) entered blocking state [ 1117.281121][ T6471] bridge0: port 1(bridge_slave_0) entered forwarding state 20:29:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d0000", 0x17}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:40 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e14480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1117.446675][ T6494] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1117.542139][ T6500] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1117.575430][ T6498] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1117.700229][ T3001] usb 2-1: new high-speed USB device number 91 using dummy_hcd [ 1117.960198][ T3001] usb 2-1: Using ep0 maxpacket: 8 [ 1118.110168][ T3001] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1118.118428][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1118.137634][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1118.152919][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1118.167819][ T3001] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1118.182341][ T3001] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1118.194700][ T3001] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1118.209531][ T3001] usb 2-1: config 0 descriptor?? [ 1118.224756][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1118.262692][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1118.274903][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1118.299373][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1118.320078][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1118.328321][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1118.350042][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1118.358443][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1118.377085][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1118.387004][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1118.395479][ T3001] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1118.404141][ T3001] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1118.418065][ T3001] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1118.480147][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1118.500140][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1118.520200][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1118.541677][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1118.560184][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1118.580079][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1118.600080][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1118.620109][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1118.640082][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1118.661595][ T3001] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1118.680059][ T3001] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1118.690736][ T3001] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1118.698970][ T3001] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1118.719996][ T3001] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1118.726344][ T3001] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1118.744315][ T3001] usb 2-1: USB disconnect, device number 91 [ 1119.269993][ T9772] usb 2-1: new high-speed USB device number 92 using dummy_hcd [ 1119.530058][ T9772] usb 2-1: Using ep0 maxpacket: 8 [ 1119.650748][ T9772] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1119.658966][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1119.678634][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1119.694998][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1119.707895][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1119.722248][ T9772] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1119.736414][ T9772] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1119.752416][ T9772] usb 2-1: config 0 descriptor?? [ 1119.805666][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1119.824401][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1119.848435][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1119.871223][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1119.879297][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1119.887600][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1119.895888][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1119.904316][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1119.912685][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1119.922187][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1119.930496][ T9772] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1119.941755][ T9772] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:29:43 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4400, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)={0xd8, 0x0, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5, 0x83, 0x1}}]}, 0xd8}, 0x1, 0x0, 0x0, 0x40000}, 0x4) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000280)=""/138) 20:29:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x3}, 0x0) 20:29:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000050008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:43 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e15480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1120.029930][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1120.050121][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1120.089635][ T6538] bridge0: port 2(bridge_slave_1) entered disabled state [ 1120.096938][ T6538] bridge0: port 1(bridge_slave_0) entered disabled state [ 1120.104678][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x4}, 0x0) [ 1120.160331][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1120.199951][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1120.229859][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1120.260926][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1120.280220][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1120.320086][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x5}, 0x0) [ 1120.369929][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1120.420029][ T9772] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1120.446585][ T9772] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1120.478240][ T9772] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1120.505802][ T9772] i2400m_usb 2-1:0.0: cannot setup device: -71 20:29:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x6}, 0x0) [ 1120.530056][ T9772] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1120.580049][ T9772] usb 2-1: USB disconnect, device number 92 [ 1120.661768][ T6544] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:29:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x7}, 0x0) [ 1120.703104][ T6544] bridge0: port 2(bridge_slave_1) entered blocking state [ 1120.711691][ T6544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1120.724215][ T6544] bridge0: port 1(bridge_slave_0) entered blocking state [ 1120.735077][ T6544] bridge0: port 1(bridge_slave_0) entered forwarding state 20:29:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x8}, 0x0) [ 1120.863119][ T6540] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1120.999780][ T9772] usb 2-1: new high-speed USB device number 93 using dummy_hcd [ 1121.027914][ T6573] bridge0: port 2(bridge_slave_1) entered disabled state [ 1121.035199][ T6573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1121.250338][ T9772] usb 2-1: Using ep0 maxpacket: 8 [ 1121.330719][ T6574] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1121.375078][ T6574] bridge0: port 2(bridge_slave_1) entered blocking state [ 1121.384285][ T6574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1121.399010][ T6574] bridge0: port 1(bridge_slave_0) entered blocking state [ 1121.408181][ T6574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1121.423495][ T9772] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1121.449766][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1121.481774][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1121.506405][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1121.536980][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1121.560662][ T9772] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1121.576587][ T9772] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1121.594265][ T9772] usb 2-1: config 0 descriptor?? [ 1121.631903][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1121.649706][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1121.657865][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1121.671343][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1121.680020][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1121.700771][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1121.708863][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1121.719432][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1121.742984][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1121.757796][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1121.766804][ T9772] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1121.777645][ T9772] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1121.785579][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1121.849904][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1121.879968][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1121.901759][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1121.919881][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1121.940161][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1121.959811][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1121.979872][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1121.999783][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1122.022825][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1122.056489][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1122.079715][ T9772] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1122.089529][ T9772] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1122.106326][ T9772] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1122.122875][ T9772] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1122.129367][ T9772] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1122.152860][ T9772] usb 2-1: USB disconnect, device number 93 [ 1122.779595][ T9772] usb 2-1: new high-speed USB device number 94 using dummy_hcd [ 1123.059629][ T9772] usb 2-1: Using ep0 maxpacket: 8 [ 1123.182830][ T9772] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1123.191836][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1123.202161][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1123.214035][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1123.223864][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1123.234040][ T9772] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1123.243708][ T9772] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1123.260788][ T9772] usb 2-1: config 0 descriptor?? [ 1123.311759][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1123.327792][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1123.346975][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1123.371296][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1123.396669][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1123.411818][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:29:46 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206070000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289d645aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000000c0)={0x2, r0}) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:29:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000073008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:46 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e16480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:46 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x9}, 0x0) 20:29:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1123.429619][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1123.437903][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1123.490552][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1123.530506][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:29:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xe}, 0x0) [ 1123.558122][ T9772] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1123.631392][ T9772] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1123.651164][ T6613] bridge0: port 2(bridge_slave_1) entered disabled state [ 1123.658353][ T6613] bridge0: port 1(bridge_slave_0) entered disabled state [ 1123.666969][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:46 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xf}, 0x0) [ 1123.717891][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1123.739584][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1123.779615][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1123.810750][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x60}, 0x0) [ 1123.839973][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1123.879609][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1123.899779][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1123.949788][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1123.989462][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xf0}, 0x0) [ 1124.009560][ T9772] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1124.037925][ T9772] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1124.074370][ T9772] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1124.096601][ T6611] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1124.103234][ T9772] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1124.121590][ T6619] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1124.151633][ T9772] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1124.159404][ T6619] bridge0: port 2(bridge_slave_1) entered blocking state [ 1124.168762][ T6619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1124.182103][ T6619] bridge0: port 1(bridge_slave_0) entered blocking state [ 1124.189954][ T6619] bridge0: port 1(bridge_slave_0) entered forwarding state 20:29:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x300}, 0x0) 20:29:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e18480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1124.217055][ T9772] usb 2-1: USB disconnect, device number 94 [ 1124.929442][ T9772] usb 2-1: new high-speed USB device number 95 using dummy_hcd [ 1125.189367][ T9772] usb 2-1: Using ep0 maxpacket: 8 [ 1125.309406][ T9772] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1125.317704][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1125.331216][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1125.343398][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1125.354441][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1125.364648][ T9772] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1125.375694][ T9772] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1125.388429][ T9772] usb 2-1: config 0 descriptor?? [ 1125.431391][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1125.439674][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1125.448291][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1125.460973][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1125.469028][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1125.477863][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1125.486370][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1125.495018][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1125.504129][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1125.513935][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1125.522445][ T9772] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1125.534189][ T9772] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1125.653666][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1125.679426][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1125.699368][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1125.719668][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1125.739360][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1125.759398][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1125.780134][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1125.799540][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1125.819356][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1125.839368][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1125.859336][ T9772] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1125.869415][ T9772] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1125.877571][ T9772] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1125.888473][ T9772] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1125.895087][ T9772] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1125.906848][ T9772] usb 2-1: USB disconnect, device number 95 [ 1126.409255][ T9850] usb 2-1: new high-speed USB device number 96 using dummy_hcd [ 1126.649159][ T9850] usb 2-1: Using ep0 maxpacket: 8 [ 1126.769550][ T9850] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1126.777905][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1126.789566][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1126.800803][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1126.810601][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1126.820768][ T9850] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1126.830302][ T9850] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1126.841213][ T9850] usb 2-1: config 0 descriptor?? [ 1126.881836][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1126.892375][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1126.903692][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1126.912297][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1126.920791][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1126.928844][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1126.949209][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1126.957298][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1126.980360][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1126.999979][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1127.009569][ T9850] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1127.021287][ T9850] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:29:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:50 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000002008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x500}, 0x0) 20:29:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e1a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1127.099185][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1127.119247][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1127.164610][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:50 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="1c17000003060108005a66c84e915b19f30000000000000500010007000000"], 0x1c}}, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f00000000c0)) write$binfmt_misc(r0, &(0x7f0000000400)={'syz1', "d7a9156d1b167f07c3cdc1f0ef0694f82ad729118495fa14859cc4152c7678419b56e94d7b84155f22af35cab0b1631f4382b49b96ee912b413b02751499bb207779b7571e62e5f64ef4873de4df"}, 0x52) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) signalfd(r1, &(0x7f0000000340)={[0x100]}, 0x8) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffff7, 0x11, r4, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000100)={0xa0000, 0x0, [0x0, 0x0, 0x0, 0xffffffffffffffff]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000500)={0x0, 0x54, &(0x7f00000004c0)="e75d3778d737bf66ea4df33f28bd95522d71185f4b0057edbc78867d6e2bb652e1acfa2c5e8cd4415c40", {0x5, 0x7, 0x20363059, 0x2, 0x1, 0xfffffff7, 0x3}}) [ 1127.219282][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1127.247616][ T6685] bridge0: port 2(bridge_slave_1) entered disabled state [ 1127.254901][ T6685] bridge0: port 1(bridge_slave_0) entered disabled state [ 1127.266238][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x600}, 0x0) [ 1127.329144][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1127.372262][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1127.409270][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1127.439180][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1127.459193][ T9850] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:29:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x700}, 0x0) [ 1127.489411][ T9850] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1127.529084][ T9850] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1127.563695][ T6683] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1127.565962][ T9850] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1127.601091][ T6691] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:29:50 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05", 0x29}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1127.646723][ T6691] bridge0: port 2(bridge_slave_1) entered blocking state [ 1127.657059][ T6691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1127.663902][ T9850] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1127.666527][ T6691] bridge0: port 1(bridge_slave_0) entered blocking state [ 1127.680725][ T6691] bridge0: port 1(bridge_slave_0) entered forwarding state 20:29:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e1b480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="250000000a008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1127.718575][ T9850] i2400m_usb: probe of 2-1:0.0 failed with error -71 20:29:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x900}, 0x0) [ 1127.807308][ T9850] usb 2-1: USB disconnect, device number 96 [ 1128.018110][ T6705] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. 20:29:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x9a8}, 0x0) 20:29:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e1e480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05", 0x29}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="250000000f008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1128.222572][ T6726] bridge0: port 2(bridge_slave_1) entered disabled state [ 1128.229864][ T6726] bridge0: port 1(bridge_slave_0) entered disabled state [ 1128.249007][ T9850] usb 2-1: new high-speed USB device number 97 using dummy_hcd [ 1128.471942][ T6730] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1128.488782][ T6732] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1128.509694][ T9850] usb 2-1: Using ep0 maxpacket: 8 [ 1128.541523][ T6732] bridge0: port 2(bridge_slave_1) entered blocking state [ 1128.550676][ T6732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1128.565830][ T6732] bridge0: port 1(bridge_slave_0) entered blocking state [ 1128.575622][ T6732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1128.669822][ T9850] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1128.672799][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1128.678040][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1128.763894][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1128.794619][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1128.818985][ T9850] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1128.830759][ T9850] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1128.841337][ T9850] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1128.852403][ T9850] usb 2-1: config 0 descriptor?? [ 1128.896239][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1128.918321][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1128.951834][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1128.973654][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1128.985878][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1128.994536][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1129.009307][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1129.017433][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1129.039040][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1129.047109][ T9850] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1129.065271][ T9850] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1129.076273][ T9850] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1130.148896][ T9850] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -110 [ 1130.162074][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.169695][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.177126][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.184442][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.191658][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.199815][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.206635][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.216379][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.226367][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.233572][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.240802][ T9850] i2400m_usb 2-1:0.0: BM-CMD: maximum errors in URB exceeded; resetting device [ 1130.250342][ T9850] i2400m_usb 2-1:0.0: boot-mode cmd 15: cannot send: -19 [ 1130.257521][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.265345][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.272579][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.281749][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.301176][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.308023][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.315260][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.323830][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.332649][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.341427][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.349113][ T9850] i2400m_usb 2-1:0.0: BM-CMD: maximum errors in URB exceeded; resetting device [ 1130.358271][ T9850] i2400m_usb 2-1:0.0: boot-mode cmd 1: cannot send: -19 [ 1130.366654][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.377138][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.384434][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.391694][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.398572][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.409075][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.415896][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.425570][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.434545][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.441756][ T9850] i2400m_usb 2-1:0.0: BM-CMD: URB error -8, retrying [ 1130.451176][ T9850] i2400m_usb 2-1:0.0: BM-CMD: maximum errors in URB exceeded; resetting device [ 1130.460610][ T9850] i2400m_usb 2-1:0.0: boot-mode cmd 1: cannot send: -19 [ 1130.469200][ T9850] i2400m_usb 2-1:0.0: device boot: tried all the echo/acks, could not get device to respond; giving up [ 1130.481046][ T9850] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -108 [ 1130.500064][ T9850] i2400m_usb 2-1:0.0: cannot setup device: -108 [ 1130.508962][ T9850] i2400m_usb: probe of 2-1:0.0 failed with error -108 20:29:53 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000180)={0x8001, 0x8, 0x10001, 0x9}, &(0x7f00000001c0)) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0xff8d, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000df26a14f5d1d3530e11a7ff1a4f31080296fffde22a372c57a6b3729b4484b61468599076a28d2c41a5cbd81438ec095b08f035b535690d870411c"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000030601080000000000000000000000000500010007200400"], 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) r1 = fsmount(r0, 0x0, 0x7b) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000340)={0x4, 0x1, 0x10000, {0x7fa369ea, 0x54e}, 0x1, 0x7}) 20:29:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="250000002f008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xe00}, 0x0) 20:29:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05", 0x29}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:53 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e25480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1130.551773][ T9772] usb 2-1: USB disconnect, device number 97 [ 1130.625055][ T6770] bridge0: port 2(bridge_slave_1) entered disabled state [ 1130.632350][ T6770] bridge0: port 1(bridge_slave_0) entered disabled state 20:29:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xf00}, 0x0) 20:29:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x6000}, 0x0) 20:29:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xa809}, 0x0) [ 1131.020148][ T6768] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1131.049524][ T6772] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:29:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e4e480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1131.097436][ T6772] bridge0: port 2(bridge_slave_1) entered blocking state [ 1131.098816][ T9772] usb 2-1: new high-speed USB device number 98 using dummy_hcd [ 1131.104973][ T6772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1131.125040][ T6772] bridge0: port 1(bridge_slave_0) entered blocking state [ 1131.133340][ T6772] bridge0: port 1(bridge_slave_0) entered forwarding state 20:29:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="250000004e008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05000500", 0x2c}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1131.400408][ T9772] usb 2-1: Using ep0 maxpacket: 8 [ 1131.410903][ T6795] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1131.439878][ T6796] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1131.483078][ T6796] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1131.520346][ T9772] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1131.528585][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1131.593500][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1131.623894][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1131.639663][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1131.658086][ T9772] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1131.683922][ T9772] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1131.710098][ T9772] usb 2-1: config 0 descriptor?? [ 1131.760735][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1131.772733][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1131.792919][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1131.803296][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1131.812678][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1131.821255][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1131.833437][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1131.852156][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1131.869544][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1131.892895][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1131.912727][ T9772] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1131.928527][ T9772] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1131.989774][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1132.008723][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1132.036760][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1132.038671][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1132.078740][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1132.099129][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1132.158637][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1132.178688][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1132.217780][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1132.248963][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1132.268692][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1132.288752][ T9772] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1132.303263][ T9772] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1132.316840][ T9772] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1132.334625][ T9772] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1132.342734][ T9772] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1132.358221][ T9772] usb 2-1: USB disconnect, device number 98 [ 1132.878677][ T9772] usb 2-1: new high-speed USB device number 99 using dummy_hcd [ 1133.118603][ T9772] usb 2-1: Using ep0 maxpacket: 8 [ 1133.238569][ T9772] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1133.246783][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1133.267001][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1133.281815][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1133.296451][ T9772] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1133.310619][ T9772] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1133.324752][ T9772] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1133.338843][ T9772] usb 2-1: config 0 descriptor?? [ 1133.380621][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1133.389451][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1133.398117][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1133.419750][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1133.430281][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1133.449851][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1133.457928][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1133.466509][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1133.476135][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1133.484541][ T9772] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1133.506467][ T9772] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1133.527035][ T9772] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:29:56 executing program 1: syz_usb_connect(0x3, 0x48, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d557b6f0009050c00000000cf658ec2820300040000000905090000000000000905045b6a2c9dfd069b2faa6c73a8f9508094097173d95635c31185dc9ac3309ed5a336575d079372a8f8382683c261a11943c0"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:29:56 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xf000}, 0x0) 20:29:56 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4e0e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:29:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05000500", 0x2c}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000050008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1133.589922][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1133.608741][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1133.635971][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1133.698544][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1133.705652][ T6835] bridge0: port 2(bridge_slave_1) entered disabled state [ 1133.713226][ T6835] bridge0: port 1(bridge_slave_0) entered disabled state 20:29:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xf0ffff}, 0x0) [ 1133.776642][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1133.810256][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1133.849021][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1133.868577][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1133.888591][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1133.908581][ T9772] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1133.928652][ T9772] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device 20:29:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x1000000}, 0x0) [ 1133.961241][ T9772] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1133.999078][ T9772] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1134.027145][ T9772] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1134.053976][ T9772] i2400m_usb: probe of 2-1:0.0 failed with error -71 20:29:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x2000000}, 0x0) [ 1134.092156][ T9772] usb 2-1: USB disconnect, device number 99 [ 1134.164025][ T6836] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1134.193593][ T6840] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:29:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000073008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:29:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x3000000}, 0x0) [ 1134.238488][ T6840] bridge0: port 2(bridge_slave_1) entered blocking state [ 1134.246378][ T6840] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1134.259724][ T6840] bridge0: port 1(bridge_slave_0) entered blocking state [ 1134.268901][ T6840] bridge0: port 1(bridge_slave_0) entered forwarding state 20:29:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff05000500", 0x2c}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1134.478453][ T9772] usb 2-1: new high-speed USB device number 100 using dummy_hcd [ 1134.533816][ T6867] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1134.718491][ T9772] usb 2-1: Using ep0 maxpacket: 8 [ 1134.839220][ T9772] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1134.847433][ T9772] usb 2-1: config 0 has an invalid descriptor of length 123, skipping remainder of the config [ 1134.871969][ T9772] usb 2-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 4 [ 1134.896686][ T9772] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1134.917581][ T9772] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1134.950538][ T9772] usb 2-1: config 0 descriptor?? [ 1135.175125][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1135.228431][ T9772] usb 2-1: string descriptor 0 read error: -71 [ 1135.248625][ T9772] usb 2-1: USB disconnect, device number 100 [ 1135.978321][ T9825] usb 2-1: new high-speed USB device number 101 using dummy_hcd [ 1136.228253][ T9825] usb 2-1: Using ep0 maxpacket: 8 [ 1136.359502][ T9825] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1136.367686][ T9825] usb 2-1: config 0 has an invalid descriptor of length 123, skipping remainder of the config [ 1136.385974][ T9825] usb 2-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 4 [ 1136.402020][ T9825] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1136.416810][ T9825] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1136.434321][ T9825] usb 2-1: config 0 descriptor?? 20:30:00 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4803000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x4000000}, 0x0) 20:30:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010028108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff0500050012", 0x2d}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:00 executing program 1: syz_usb_connect(0x6, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000090002f80000000000000009050004000000000000050800000000000009050400"/64], 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)=@sco={0x1f, @none}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/37, 0x25}], 0x1}, 0x2100) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="4400000000000000000000000c000300686173683a6970000500040000000000096c937ebf344fe223f000020073797a320010000005000500020000000500ac456f094ab653bd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec76724b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb5a262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000000000000000000008000000002549cbdbe8487c26a6ef547816719114c3b0cd1a8216f08537be5bc75cc22f35ac12ea300b918944d799595104824853252cc8af686c580cab0c82779e166e00000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000009f89030601080000000000000000000000000500010007000000"], 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x1ba6, 0x4) ioctl$SNDCTL_TMR_METRONOME(r0, 0x40045407) recvmsg$can_raw(r0, &(0x7f0000000900)={&(0x7f0000000480)=@qipcrtr, 0x80, &(0x7f0000000800)=[{&(0x7f0000000500)=""/67, 0x43}, {&(0x7f0000000580)=""/185, 0xb9}, {&(0x7f0000000640)=""/134, 0x86}, {&(0x7f0000000700)=""/158, 0x9e}, {&(0x7f00000007c0)=""/36, 0x24}], 0x5, &(0x7f0000000880)=""/114, 0x72}, 0x2020) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x3fd, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r2, 0x5410, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000a00)=@assoc_id=0x0, &(0x7f0000000a40)=0x4) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000a80)=r3, 0x4) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000980)={0x9f0000, 0x200, 0x2, r2, 0x0, &(0x7f0000000940)={0x990a7b, 0x9, [], @ptr=0x1ff}}) [ 1136.728375][ T9825] usb 2-1: string descriptor 0 read error: -71 [ 1136.779113][ T9825] usb 2-1: USB disconnect, device number 101 [ 1136.832058][ T6904] bridge0: port 2(bridge_slave_1) entered disabled state [ 1136.839354][ T6904] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x5000000}, 0x0) 20:30:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x6000000}, 0x0) 20:30:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x7000000}, 0x0) 20:30:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x8000000}, 0x0) 20:30:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x9000000}, 0x0) [ 1137.247052][ T6902] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1137.277554][ T6908] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:30:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff0500050012", 0x2d}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1137.331111][ T6908] bridge0: port 2(bridge_slave_1) entered blocking state [ 1137.340109][ T6908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1137.352598][ T6908] bridge0: port 1(bridge_slave_0) entered blocking state [ 1137.363957][ T6908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1137.569355][ T6930] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. 20:30:01 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[], 0x44}, 0x1, 0x0, 0x0, 0x240000c0}, 0x2400c011) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:30:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xe000000}, 0x0) 20:30:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010038108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4810000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff0500050012", 0x2d}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1137.779370][ T6937] bridge0: port 2(bridge_slave_1) entered disabled state [ 1137.786627][ T6937] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xf000000}, 0x0) [ 1138.097330][ T6939] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1138.117198][ T6939] bridge0: port 2(bridge_slave_1) entered blocking state [ 1138.127918][ T6939] bridge0: port 2(bridge_slave_1) entered forwarding state 20:30:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x60000000}, 0x0) [ 1138.140907][ T6939] bridge0: port 1(bridge_slave_0) entered blocking state [ 1138.150150][ T6939] bridge0: port 1(bridge_slave_0) entered forwarding state 20:30:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4825000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1138.281297][ T6948] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1138.320397][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:30:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1138.338103][ T8980] usb 2-1: new high-speed USB device number 102 using dummy_hcd 20:30:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010048108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1138.489464][ T6965] bridge0: port 2(bridge_slave_1) entered disabled state [ 1138.496866][ T6965] bridge0: port 1(bridge_slave_0) entered disabled state [ 1138.588118][ T8980] usb 2-1: Using ep0 maxpacket: 8 [ 1138.709044][ T8980] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1138.717372][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1138.751639][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1138.789949][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1138.821143][ T6970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1138.826708][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1138.828379][ T6970] bridge0: port 1(bridge_slave_0) entered disabled state [ 1138.856827][ T8980] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1138.876851][ T8980] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1138.898241][ T8980] usb 2-1: config 0 descriptor?? [ 1138.940141][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1138.959634][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1138.990108][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1139.018988][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1139.047388][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1139.079354][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1139.107477][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1139.136533][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1139.175735][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1139.215738][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1139.246907][ T8980] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1139.268801][ T6971] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1139.301267][ T6971] bridge0: port 2(bridge_slave_1) entered blocking state [ 1139.309611][ T6971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1139.317209][ T6971] bridge0: port 1(bridge_slave_0) entered blocking state [ 1139.324386][ T6971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1139.338846][ T8980] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1139.388047][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1139.408233][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1139.428223][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1139.437295][ T6975] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1139.448018][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1139.454923][ T6975] bridge0: port 2(bridge_slave_1) entered blocking state [ 1139.462119][ T6975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1139.468178][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1139.469541][ T6975] bridge0: port 1(bridge_slave_0) entered blocking state [ 1139.483295][ T6975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1139.497033][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1139.528197][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1139.558251][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1139.577913][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1139.598915][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1139.618671][ T8980] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1139.642369][ T8980] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1139.659186][ T8980] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1139.666913][ T8980] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1139.673741][ T8980] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1139.689894][ T8980] usb 2-1: USB disconnect, device number 102 [ 1140.267915][ T8980] usb 2-1: new high-speed USB device number 103 using dummy_hcd [ 1140.507789][ T8980] usb 2-1: Using ep0 maxpacket: 8 [ 1140.628548][ T8980] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1140.637267][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1140.657233][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1140.671412][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1140.686692][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1140.701135][ T8980] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1140.715098][ T8980] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1140.731358][ T8980] usb 2-1: config 0 descriptor?? [ 1140.770182][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1140.779205][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1140.787260][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1140.798926][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1140.807565][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1140.817431][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1140.825707][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1140.834241][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1140.852010][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1140.869428][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1140.897779][ T8980] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1140.909139][ T8980] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:30:04 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504", @ANYBLOB="2f25409851b42507e7e4c16b95bf840cb5921eea4bfe45782711c3696d06b5a3a10b0f4a869a908a565fd3bcd2b073c0f92f0c7e6b57a269ee5ab7f95bffb37725b120d5fbe7de0abbff421aa95dcc0966ba050d2fc7b26abf9cedb3fc404ddd8d4556540b147d82145a0193cb8f11c98ffc760d3cd13486caf58ca4b96e20711d7d59d1ab04199c1e448cce995d08dc24d261afb8e806717d99ba66bf22d953b40ee0e53a83acbd7d4f9b257422c789d562a4c7e5384953fe5977a164bea353d35fca06b7b704a2d9cffb8815b623d4b773b630d8382c35b0fde99701"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:30:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x9effffff}, 0x0) 20:30:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a484e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010058108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:04 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1140.996304][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1141.037997][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1141.077144][ T7012] bridge0: port 2(bridge_slave_1) entered disabled state 20:30:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xa8090000}, 0x0) [ 1141.084461][ T7012] bridge0: port 1(bridge_slave_0) entered disabled state [ 1141.092378][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1141.129708][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1141.168252][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1141.207777][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1141.237858][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xf0ffffff}, 0x0) [ 1141.278066][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1141.308036][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1141.348556][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1141.377809][ T8980] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1141.403826][ T8980] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1141.442019][ T8980] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 20:30:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xf5ffffff}, 0x0) [ 1141.478047][ T8980] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1141.506629][ T8980] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1141.563077][ T8980] usb 2-1: USB disconnect, device number 103 [ 1141.647309][ T7013] bridge0: port 2(bridge_slave_1) entered disabled state [ 1141.654667][ T7013] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xfcffffff}, 0x0) 20:30:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xfffff000}, 0x0) 20:30:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 1141.977912][ T8980] usb 2-1: new high-speed USB device number 104 using dummy_hcd [ 1141.993313][ T7019] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1142.028883][ T7019] bridge0: port 2(bridge_slave_1) entered blocking state [ 1142.036114][ T7019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1142.045137][ T7019] bridge0: port 1(bridge_slave_0) entered blocking state [ 1142.052994][ T7019] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1142.074944][ T7020] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1142.102953][ T7020] bridge0: port 2(bridge_slave_1) entered blocking state [ 1142.110165][ T7020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1142.117647][ T7020] bridge0: port 1(bridge_slave_0) entered blocking state [ 1142.124813][ T7020] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1142.246888][ T8980] usb 2-1: Using ep0 maxpacket: 8 [ 1142.388529][ T8980] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1142.396801][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1142.416161][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1142.435977][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1142.462295][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has an invalid bInterval 152, changing to 11 [ 1142.484343][ T8980] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1142.495170][ T8980] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1142.507629][ T8980] usb 2-1: config 0 descriptor?? [ 1142.549665][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1142.560143][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1142.575344][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1142.610803][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1142.664974][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1142.692342][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1142.722331][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1142.744142][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1142.784373][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1142.813214][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1142.837678][ T8980] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1142.848785][ T8980] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1142.877684][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1142.897610][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1142.917987][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1142.937593][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1142.957698][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1142.977613][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1142.997633][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1143.017745][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1143.017965][T22389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1143.037620][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1143.049875][T22389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1143.057715][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1143.080455][ T8980] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1143.090625][ T8980] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1143.099274][ T8980] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1143.106879][ T8980] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1143.116591][ T8980] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1143.130314][ T8980] usb 2-1: USB disconnect, device number 104 [ 1143.687549][ T8980] usb 2-1: new high-speed USB device number 105 using dummy_hcd [ 1143.937586][ T8980] usb 2-1: Using ep0 maxpacket: 8 [ 1144.067640][ T8980] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1144.075909][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1144.089456][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1144.100789][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1144.111077][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has an invalid bInterval 152, changing to 11 [ 1144.122611][ T8980] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1144.131748][ T8980] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1144.145702][ T8980] usb 2-1: config 0 descriptor?? [ 1144.199558][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1144.208371][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1144.216446][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1144.227808][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1144.235995][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1144.244185][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1144.258512][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1144.266581][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:30:07 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x400000, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) bind$netlink(r2, &(0x7f0000000380)={0x10, 0x0, 0x25dfdbfe, 0x200000}, 0xc) ioctl$HIDIOCGVERSION(r1, 0x80044801, &(0x7f0000000340)) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:30:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xffffff9e}, 0x0) 20:30:07 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4800240d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010068108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1144.311529][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1144.332700][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1144.393683][ T8980] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1144.412425][ T7089] bridge0: port 2(bridge_slave_1) entered disabled state [ 1144.419701][ T7089] bridge0: port 1(bridge_slave_0) entered disabled state [ 1144.449331][ T8980] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:30:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xfffffff0}, 0x0) [ 1144.567474][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1144.587725][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1144.618097][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1144.647603][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xfffffff5}, 0x0) [ 1144.678866][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1144.717534][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1144.757723][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1144.789459][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1144.817595][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1144.847605][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xfffffffc}, 0x0) [ 1144.872907][ T7086] bridge0: port 2(bridge_slave_1) entered disabled state [ 1144.880234][ T7086] bridge0: port 1(bridge_slave_0) entered disabled state [ 1144.898139][ T8980] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1144.934039][ T8980] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1144.968743][ T8980] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 20:30:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) [ 1145.000423][ T8980] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1145.038348][ T8980] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1145.090497][ T8980] usb 2-1: USB disconnect, device number 105 20:30:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x100000000000000}, 0x0) 20:30:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x200000000000000}, 0x0) [ 1145.391567][ T7091] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1145.410381][ T7091] bridge0: port 2(bridge_slave_1) entered blocking state [ 1145.417618][ T7091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1145.426968][ T7091] bridge0: port 1(bridge_slave_0) entered blocking state [ 1145.434144][ T7091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1145.519919][ T7093] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1145.537486][ T8980] usb 2-1: new high-speed USB device number 106 using dummy_hcd [ 1145.561532][ T7093] bridge0: port 2(bridge_slave_1) entered blocking state [ 1145.568873][ T7093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1145.577671][ T7093] bridge0: port 1(bridge_slave_0) entered blocking state [ 1145.584792][ T7093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1145.777328][ T8980] usb 2-1: Using ep0 maxpacket: 8 [ 1145.913537][ T8980] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1145.922218][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1145.946500][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1145.967239][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1145.988339][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1146.001276][ T8980] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1146.010969][ T8980] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1146.022798][ T8980] usb 2-1: config 0 descriptor?? [ 1146.089637][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1146.098232][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1146.106287][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1146.119226][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1146.127805][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1146.137034][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1146.145650][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1146.154245][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1146.162749][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1146.171414][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1146.188310][ T8980] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1146.207358][ T8980] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1146.317410][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1146.337305][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1146.362708][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1146.392708][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1146.417274][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1146.440636][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1146.447351][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1146.455506][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1146.467343][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1146.507318][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1146.527712][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1146.558940][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1146.577386][ T8980] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1146.592032][ T8980] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1146.603559][ T8980] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1146.622096][ T8980] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1146.631510][ T8980] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1146.645778][ T8980] usb 2-1: USB disconnect, device number 106 [ 1147.177876][ T8980] usb 2-1: new high-speed USB device number 107 using dummy_hcd [ 1147.427131][ T8980] usb 2-1: Using ep0 maxpacket: 8 [ 1147.577412][ T8980] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1147.585669][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1147.595541][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1147.606530][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1147.616274][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1147.626647][ T8980] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1147.636830][ T8980] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1147.650942][ T8980] usb 2-1: config 0 descriptor?? [ 1147.699215][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1147.710847][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1147.719291][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1147.729727][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1147.737996][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1147.746149][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1147.754352][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1147.762643][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1147.780054][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:30:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x300000000000000}, 0x0) 20:30:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010078108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1147.797347][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1147.813729][ T8980] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1147.835442][ T8980] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:30:11 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000400010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000180)=0x3, 0x2) [ 1147.889193][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1147.917350][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1147.942616][ T7162] bridge0: port 2(bridge_slave_1) entered disabled state [ 1147.949957][ T7162] bridge0: port 1(bridge_slave_0) entered disabled state [ 1147.957827][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x400000000000000}, 0x0) [ 1148.017094][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1148.078296][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1148.097311][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1148.127186][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1148.147131][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1148.177151][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x500000000000000}, 0x0) [ 1148.207218][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1148.247371][ T8980] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1148.275573][ T8980] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1148.307876][ T8980] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1148.334851][ T8980] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1148.369630][ T8980] i2400m_usb: probe of 2-1:0.0 failed with error -71 20:30:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x600000000000000}, 0x0) [ 1148.424686][ T8980] usb 2-1: USB disconnect, device number 107 [ 1148.482286][ T7163] bridge0: port 2(bridge_slave_1) entered disabled state [ 1148.489670][ T7163] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x700000000000000}, 0x0) 20:30:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x800000000000000}, 0x0) 20:30:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x900000000000000}, 0x0) [ 1148.807126][ T8980] usb 2-1: new high-speed USB device number 108 using dummy_hcd [ 1148.887310][ T7168] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1148.910111][ T7168] bridge0: port 2(bridge_slave_1) entered blocking state [ 1148.917365][ T7168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1148.925679][ T7168] bridge0: port 1(bridge_slave_0) entered blocking state [ 1148.932873][ T7168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1148.991540][ T7175] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1149.017317][ T7175] bridge0: port 2(bridge_slave_1) entered blocking state [ 1149.025475][ T7175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1149.032939][ T7175] bridge0: port 1(bridge_slave_0) entered blocking state 20:30:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e6400000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xe00000000000000}, 0x0) 20:30:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010088108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1149.040109][ T7175] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1149.077017][ T8980] usb 2-1: Using ep0 maxpacket: 8 [ 1149.207771][ T8980] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1149.208638][ T7208] bridge0: port 2(bridge_slave_1) entered disabled state [ 1149.215998][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1149.216033][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1149.223231][ T7208] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1149.331706][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1149.382639][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1149.498871][ T8980] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1149.517098][ T8980] usb 2-1: New USB device strings: Mfr=0, Product=4, SerialNumber=0 [ 1149.550924][ T8980] usb 2-1: Product: syz [ 1149.574069][ T8980] usb 2-1: config 0 descriptor?? [ 1149.639216][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1149.653716][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1149.662731][ T7212] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1149.692753][ T7212] bridge0: port 2(bridge_slave_1) entered blocking state [ 1149.702060][ T7212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1149.714265][ T7212] bridge0: port 1(bridge_slave_0) entered blocking state [ 1149.723135][ T7212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1149.769171][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1149.777805][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1149.800549][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1149.823073][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1149.852854][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1149.900672][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1149.912579][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1149.936979][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1149.945058][ T8980] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1149.963029][ T8980] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1149.981890][ T7215] bridge0: port 2(bridge_slave_1) entered disabled state [ 1149.989115][ T7215] bridge0: port 1(bridge_slave_0) entered disabled state [ 1149.997240][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1150.017047][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1150.047853][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1150.067112][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1150.095008][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1150.146885][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1150.171238][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1150.217010][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1150.286851][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1150.306872][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1150.336905][ T8980] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1150.352575][ T8980] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1150.369968][ T8980] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1150.400450][ T8980] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1150.410470][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1150.420161][ T7219] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1150.420534][ T8980] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1150.437610][ T7219] bridge0: port 2(bridge_slave_1) entered blocking state [ 1150.445265][ T7219] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1150.452720][ T7219] bridge0: port 1(bridge_slave_0) entered blocking state [ 1150.459883][ T7219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1150.474773][ T8980] usb 2-1: USB disconnect, device number 108 [ 1150.876821][ T8980] usb 2-1: new high-speed USB device number 109 using dummy_hcd [ 1151.147162][ T8980] usb 2-1: Using ep0 maxpacket: 8 [ 1151.287533][ T8980] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1151.295814][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1151.315439][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1151.331875][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1151.344657][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1151.447238][ T8980] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1151.456769][ T8980] usb 2-1: New USB device strings: Mfr=0, Product=4, SerialNumber=0 [ 1151.464875][ T8980] usb 2-1: Product: syz [ 1151.479509][ T8980] usb 2-1: config 0 descriptor?? 20:30:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e010d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xf00000000000000}, 0x0) 20:30:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010098108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1151.496949][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1151.560262][ T8980] usb 2-1: can't set config #0, error -71 [ 1151.582573][ T8980] usb 2-1: USB disconnect, device number 109 [ 1151.635981][ T7256] bridge0: port 2(bridge_slave_1) entered disabled state [ 1151.643246][ T7256] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x6000000000000000}, 0x0) 20:30:15 executing program 1: r0 = syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYRES16=r0], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000280)=""/138) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x8800, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000700)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r3, 0xc01064ab, &(0x7f0000000740)={0x1, 0x2, 0xc35}) r4 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r4, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="1a614beab760000036c64b2f76922aa4741070d5e3e7045d5f793c5e4c731ca6dd052100000000ffff2e41bac8d1e83ecf8c0d08"]}) connect$pppl2tp(r2, &(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x8, 0x3, 0x1, 0x2, {0xa, 0x4e22, 0x60a, @empty, 0x5}}}, 0x3a) r5 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000100)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xd490010}, 0xc, &(0x7f0000000600)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRESOCT=r5, @ANYRESHEX], 0x3}, 0x1, 0x0, 0x0, 0x4c051}, 0x1) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="030367", @ANYRES16=r5, @ANYBLOB="00022abd7000fddbdf253fcc642f020000002b3cf7b0d044f14d88000500030000004400035f31000000000600040007000000060007004e080001000000140006050000000000000000000000000000000020000381080005007f000001140002006d61637365633000000000000000000008ba7200a80a00000000000000"], 0x90}, 0x1, 0x0, 0x0, 0x20004801}, 0x0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x18, 0x3f9, 0x200, 0x70bd2d, 0x25dfdbfc, {0x1, 0x1}, ["", "", "", "", "", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x40) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="a16e02b3", @ANYRES16=r5, @ANYBLOB="00032abd7000fcdbdf25040000000800050000000100080006000000000008000400ff0000000800060007000000080005009c000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4004001}, 0x24000000) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000480)={0x114, r5, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x63874a75412a17bb}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x2b8ef61ac34cb5b2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xffff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc3}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x22}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3, 0xd}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x70}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3ce2632a}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xc9f}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x185}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fffffff}]}, 0x114}, 0x1, 0x0, 0x0, 0x51}, 0x40) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r5, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x81}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040000) 20:30:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 20:30:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xa809000000000000}, 0x0) [ 1152.096278][ T7253] bridge0: port 2(bridge_slave_1) entered disabled state [ 1152.103531][ T7253] bridge0: port 1(bridge_slave_0) entered disabled state [ 1152.137004][ T8980] usb 2-1: new high-speed USB device number 110 using dummy_hcd 20:30:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 20:30:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xf5ffffff00000000}, 0x0) [ 1152.376649][ T8980] usb 2-1: Using ep0 maxpacket: 8 20:30:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xfcffffff00000000}, 0x0) [ 1152.489372][ T7262] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1152.507491][ T8980] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1152.515739][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1152.527244][ T7262] bridge0: port 2(bridge_slave_1) entered blocking state [ 1152.537377][ T7262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1152.544833][ T7262] bridge0: port 1(bridge_slave_0) entered blocking state [ 1152.551997][ T7262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1152.588467][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1152.621566][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1152.642927][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1152.657906][ T7265] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1152.677739][ T7265] bridge0: port 2(bridge_slave_1) entered blocking state [ 1152.684929][ T7265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1152.693329][ T7265] bridge0: port 1(bridge_slave_0) entered blocking state [ 1152.700552][ T7265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1152.726642][ T8980] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1152.750914][ T8980] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1152.777649][ T8980] usb 2-1: config 0 descriptor?? [ 1152.829399][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1152.861417][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:30:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e020d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 20:30:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="25000000100a8108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1152.900036][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1152.958372][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1152.972814][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1152.983537][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:30:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xffffffff00000000}, 0x0) [ 1153.008161][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1153.048443][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1153.078248][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1153.097193][ T8980] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1153.115537][ T8980] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1153.147108][ T8980] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1153.223127][ T7300] bridge0: port 2(bridge_slave_1) entered disabled state [ 1153.230454][ T7300] bridge0: port 1(bridge_slave_0) entered disabled state [ 1153.612441][ T7305] bridge0: port 2(bridge_slave_1) entered disabled state [ 1153.619702][ T7305] bridge0: port 1(bridge_slave_0) entered disabled state [ 1153.841636][ T7307] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1153.854345][ T7307] bridge0: port 2(bridge_slave_1) entered blocking state [ 1153.864713][ T7307] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1153.874987][ T7307] bridge0: port 1(bridge_slave_0) entered blocking state [ 1153.877420][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1153.882274][ T7307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1153.899840][ T7309] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1153.916699][ T7309] bridge0: port 2(bridge_slave_1) entered blocking state [ 1153.923891][ T7309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1153.931371][ T7309] bridge0: port 1(bridge_slave_0) entered blocking state [ 1153.936514][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1153.938609][ T7309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1153.957138][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1153.986736][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.008759][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.067885][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.108840][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.126553][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.158130][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.176520][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.196530][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.216543][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.256553][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.278622][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.296736][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.319165][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.356536][ T8980] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1154.376620][ T8980] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1154.406492][ T8980] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1154.414795][ T8980] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1154.451916][ T8980] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1154.473595][ T8980] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1154.494915][ T8980] usb 2-1: USB disconnect, device number 110 [ 1154.886427][ T8980] usb 2-1: new high-speed USB device number 111 using dummy_hcd [ 1155.126407][ T8980] usb 2-1: Using ep0 maxpacket: 8 [ 1155.247444][ T8980] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1155.255684][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1155.269106][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1155.280445][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1155.291583][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1155.301386][ T8980] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1155.310573][ T8980] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1155.325078][ T8980] usb 2-1: config 0 descriptor?? 20:30:18 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c00000000000009ff010000000000090504000000000000000000009e81b3df81acf0bd103d9be191a5361f07d8c71b0eb6e4390ee6f8bb"], 0x0) r0 = socket$inet6(0xa, 0xa, 0x8000) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x8001, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4}, 0x1c) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000280)=""/138) r2 = dup(r0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000003c0)={@in={{0x2, 0x4e20, @broadcast}}, 0x0, 0x0, 0xc, 0x0, "c696e8037cb02c71fe74739c9a6525e960039ecdf058d670efb75867f4667b860ee6cc71a5ba9af7423a3196e7871b1be850dab84bf7ad5fda7a451d16843c5545499bf3a58bcac6aaf22227e6b513bf"}, 0xd8) 20:30:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 20:30:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="25000000100c8108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e030d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1155.386471][ T8980] usb 2-1: can't set config #0, error -71 [ 1155.404960][ T8980] usb 2-1: USB disconnect, device number 111 [ 1155.477025][ T7355] bridge0: port 2(bridge_slave_1) entered disabled state [ 1155.484253][ T7355] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) 20:30:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x2}, 0x0) 20:30:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x3}, 0x0) 20:30:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x0) 20:30:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x5}, 0x0) [ 1155.906438][ T8980] usb 2-1: new high-speed USB device number 112 using dummy_hcd 20:30:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x6}, 0x0) [ 1156.146353][ T8980] usb 2-1: Using ep0 maxpacket: 8 [ 1156.184300][ T7353] bridge0: port 2(bridge_slave_1) entered disabled state [ 1156.191557][ T7353] bridge0: port 1(bridge_slave_0) entered disabled state [ 1156.300495][ T8980] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1156.315005][ T8980] usb 2-1: config 0 has an invalid interface descriptor of length 5, skipping [ 1156.351112][ T8980] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1156.386388][ T8980] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1156.396082][ T8980] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 4 [ 1156.446547][ T8980] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1156.455728][ T8980] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1156.488061][ T8980] usb 2-1: config 0 descriptor?? [ 1156.529521][ T7359] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1156.557003][ T7359] bridge0: port 2(bridge_slave_1) entered blocking state [ 1156.564120][ T7359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1156.574479][ T7359] bridge0: port 1(bridge_slave_0) entered blocking state [ 1156.581628][ T7359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1156.647237][ T7360] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1156.666361][ T7360] bridge0: port 2(bridge_slave_1) entered blocking state [ 1156.673480][ T7360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1156.683981][ T7360] bridge0: port 1(bridge_slave_0) entered blocking state [ 1156.691136][ T7360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1156.846718][ T17] usb 2-1: USB disconnect, device number 112 [ 1157.566364][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1157.575424][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1157.636281][ T9825] usb 2-1: new high-speed USB device number 113 using dummy_hcd [ 1157.886141][ T9825] usb 2-1: Using ep0 maxpacket: 8 [ 1158.016831][ T9825] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1158.025026][ T9825] usb 2-1: config 0 has an invalid interface descriptor of length 5, skipping [ 1158.042298][ T9825] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1158.056566][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1158.070954][ T9825] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 4 [ 1158.087588][ T9825] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1158.101635][ T9825] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1158.115882][ T9825] usb 2-1: config 0 descriptor?? 20:30:21 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="44000000020603fffffff400000000000000c625b3ea865700000c0d0300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec56721880ec52189eb672018595201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d39000000000000005216da292cd52e534d7e68d0c70e9850af646b426ad3970b519064d7551935382040d47eb6cfc69d08a491b6904789d78284544fda17ae9c5401115df17b44177fb0e7e11e82cf39ff"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:30:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e040d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x7}, 0x0) 20:30:21 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="25000000100e8108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1158.374751][ T9825] usb 2-1: USB disconnect, device number 113 [ 1158.488684][ T7420] bridge0: port 2(bridge_slave_1) entered disabled state [ 1158.495924][ T7420] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x8}, 0x0) 20:30:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x9}, 0x0) 20:30:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xe}, 0x0) 20:30:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xf}, 0x0) [ 1158.926204][ T9825] usb 2-1: new high-speed USB device number 114 using dummy_hcd 20:30:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x60}, 0x0) [ 1159.099180][ T7423] bridge0: port 2(bridge_slave_1) entered disabled state [ 1159.106504][ T7423] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:22 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xf0}, 0x0) [ 1159.175991][ T9825] usb 2-1: Using ep0 maxpacket: 8 [ 1159.306224][ T9825] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1159.321216][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1159.365562][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1159.391233][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1159.412880][ T7426] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1159.419684][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1159.445661][ T7426] bridge0: port 2(bridge_slave_1) entered blocking state [ 1159.452899][ T7426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1159.459969][ T9825] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1159.460355][ T7426] bridge0: port 1(bridge_slave_0) entered blocking state [ 1159.476304][ T7426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1159.500948][ T9825] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1159.548377][ T9825] usb 2-1: config 0 descriptor?? [ 1159.594198][ T7432] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1159.608046][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1159.630046][ T7432] bridge0: port 2(bridge_slave_1) entered blocking state [ 1159.637256][ T7432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1159.644692][ T7432] bridge0: port 1(bridge_slave_0) entered blocking state [ 1159.651861][ T7432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1159.671452][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1159.701046][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1159.732213][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1159.759469][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1159.779134][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1159.787794][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1159.820321][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1159.857970][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1159.886721][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1159.895030][ T9825] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1159.947128][ T9825] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1159.985953][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1160.006137][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1160.045880][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1160.070830][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1160.096019][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1160.115938][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1160.146148][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1160.172274][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1160.199710][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1160.225998][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1160.255962][ T9825] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1160.266757][ T9825] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1160.275104][ T9825] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1160.286551][ T9825] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1160.294944][ T9825] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1160.308219][ T9825] usb 2-1: USB disconnect, device number 114 [ 1160.419040][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1160.427241][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1160.715903][ T9825] usb 2-1: new high-speed USB device number 115 using dummy_hcd [ 1160.976578][ T9825] usb 2-1: Using ep0 maxpacket: 8 [ 1161.105932][ T9825] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1161.114208][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1161.133420][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1161.145489][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1161.161672][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1161.171715][ T9825] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1161.181552][ T9825] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1161.196665][ T9825] usb 2-1: config 0 descriptor?? [ 1161.237899][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1161.256953][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1161.265041][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1161.284518][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1161.307351][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1161.315428][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1161.336327][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1161.344398][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1161.365876][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1161.373949][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1161.382137][ T9825] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1161.394137][ T9825] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:30:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e050d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x300}, 0x0) 20:30:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010108108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:24 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) [ 1161.445945][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1161.465882][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1161.506163][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1161.539435][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1161.571944][ T7487] bridge0: port 2(bridge_slave_1) entered disabled state [ 1161.579229][ T7487] bridge0: port 1(bridge_slave_0) entered disabled state [ 1161.588331][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1161.615994][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1161.648504][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1161.676427][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1161.715884][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x500}, 0x0) [ 1161.755946][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1161.785774][ T9825] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device 20:30:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x600}, 0x0) [ 1161.824363][ T9825] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1161.880994][ T9825] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1161.916849][ T9825] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1161.946358][ T9825] i2400m_usb: probe of 2-1:0.0 failed with error -71 20:30:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x700}, 0x0) [ 1162.007511][ T9825] usb 2-1: USB disconnect, device number 115 [ 1162.120514][ T7491] bridge0: port 2(bridge_slave_1) entered disabled state [ 1162.127788][ T7491] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x900}, 0x0) 20:30:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x9a8}, 0x0) [ 1162.395851][ T9825] usb 2-1: new high-speed USB device number 116 using dummy_hcd 20:30:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xe00}, 0x0) 20:30:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e060d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1162.522574][ T7496] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1162.540207][ T7496] bridge0: port 2(bridge_slave_1) entered blocking state [ 1162.547453][ T7496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1162.555748][ T7496] bridge0: port 1(bridge_slave_0) entered blocking state [ 1162.562888][ T7496] bridge0: port 1(bridge_slave_0) entered forwarding state 20:30:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1162.635838][ T9825] usb 2-1: device descriptor read/64, error 18 20:30:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010488108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xf00}, 0x0) [ 1162.744285][ T7529] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1162.785191][ T7529] bridge0: port 2(bridge_slave_1) entered blocking state [ 1162.793478][ T7529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1162.807701][ T7529] bridge0: port 1(bridge_slave_0) entered blocking state [ 1162.815875][ T7529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1162.925949][ T9825] usb 2-1: new high-speed USB device number 117 using dummy_hcd [ 1163.145608][ T9825] usb 2-1: device descriptor read/64, error 18 [ 1163.276922][ T9825] usb usb2-port1: attempt power cycle [ 1163.515644][T29171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1163.523671][T29171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1164.015555][ T9825] usb 2-1: new high-speed USB device number 118 using dummy_hcd [ 1164.205720][ T9825] usb 2-1: device descriptor read/8, error -61 [ 1164.485566][ T9825] usb 2-1: new high-speed USB device number 119 using dummy_hcd 20:30:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e070d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:27 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 20:30:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="25000000104c8108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:27 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f00000000c0)) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000003060108000000000000000000000b000500010007000000"], 0x1c}}, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r0, 0x5410, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x7) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)=@newlink={0x54, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x28, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8}, @IFLA_IPTUN_6RD_PREFIX={0x14, 0xb, @mcast1}, @IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}]}}}]}, 0x54}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000340), &(0x7f0000000380)=0x8) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000280)=""/138) [ 1164.635555][ T9825] usb 2-1: device descriptor read/8, error -71 [ 1164.691506][ T7553] bridge0: port 2(bridge_slave_1) entered disabled state [ 1164.698811][ T7553] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xa809}, 0x0) [ 1164.766653][ T9825] usb usb2-port1: unable to enumerate USB device 20:30:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 20:30:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e080d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) [ 1165.005663][ T7554] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1165.034555][ T7559] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. 20:30:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010608108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1165.082178][ T7559] bridge0: port 2(bridge_slave_1) entered blocking state [ 1165.090750][ T7559] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1165.105433][ T7559] bridge0: port 1(bridge_slave_0) entered blocking state [ 1165.115384][ T7559] bridge0: port 1(bridge_slave_0) entered forwarding state 20:30:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1165.126524][ T9825] usb 2-1: new high-speed USB device number 120 using dummy_hcd 20:30:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) [ 1165.385381][ T9825] usb 2-1: Using ep0 maxpacket: 8 20:30:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e090d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 1165.506134][ T9825] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1165.514573][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 20:30:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 1165.558089][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1165.596921][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1165.651712][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1165.665584][ T9825] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1165.675252][ T9825] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1165.690095][ T7582] bridge0: port 2(bridge_slave_1) entered disabled state [ 1165.697446][ T7582] bridge0: port 1(bridge_slave_0) entered disabled state [ 1165.717617][ T9825] usb 2-1: config 0 descriptor?? [ 1165.787988][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1165.814714][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1165.845464][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1165.864234][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1165.882799][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1165.902623][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1165.921063][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1165.942254][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1165.968573][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1166.007123][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1166.034668][ T9825] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1166.053260][ T9825] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1166.061278][ T7586] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1166.079114][ T7586] bridge0: port 2(bridge_slave_1) entered blocking state [ 1166.086370][ T7586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1166.095293][ T7586] bridge0: port 1(bridge_slave_0) entered blocking state [ 1166.102587][ T7586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1166.163957][ T7593] bridge0: port 2(bridge_slave_1) entered disabled state [ 1166.171424][ T7593] bridge0: port 1(bridge_slave_0) entered disabled state [ 1166.452583][ T7595] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1166.463135][ T7595] bridge0: port 2(bridge_slave_1) entered blocking state [ 1166.470344][ T7595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1166.477804][ T7595] bridge0: port 1(bridge_slave_0) entered blocking state [ 1166.484924][ T7595] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1166.521460][ T9529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1166.785349][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1166.825434][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1166.847027][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1166.875382][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1166.895266][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1166.915439][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1166.935685][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1166.965471][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1166.985402][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1167.015467][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1167.045381][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1167.077042][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1167.095399][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1167.115444][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1167.145422][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1167.165950][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1167.196331][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1167.215300][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1167.240117][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1167.265472][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1167.295300][ T9825] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1167.311036][ T9825] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1167.326134][ T9825] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1167.333955][ T9825] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1167.340801][ T9825] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1167.352713][ T9825] usb 2-1: USB disconnect, device number 120 [ 1167.745219][ T9825] usb 2-1: new high-speed USB device number 121 using dummy_hcd [ 1167.985245][ T9825] usb 2-1: Using ep0 maxpacket: 8 [ 1168.105348][ T9825] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1168.113711][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1168.123955][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1168.135579][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1168.147510][ T9825] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1168.157301][ T9825] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1168.166832][ T9825] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1168.181632][ T9825] usb 2-1: config 0 descriptor?? [ 1168.237488][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1168.247097][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1168.281395][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1168.310475][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:30:31 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f80001007d0009050c00000000000009058203000400000009050800000000000009050400"/66], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:30:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 20:30:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010688108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a0d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1168.335678][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1168.343790][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1168.406505][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1168.426723][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1168.448370][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:30:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) [ 1168.479312][ T9825] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1168.500989][ T9825] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1168.529696][ T9825] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1168.547192][ T7637] bridge0: port 2(bridge_slave_1) entered disabled state [ 1168.554695][ T7637] bridge0: port 1(bridge_slave_0) entered disabled state [ 1168.575181][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:31 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) [ 1168.605212][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1168.636623][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1168.675343][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1168.715165][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1168.745792][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1168.776425][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) [ 1168.805326][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1168.846825][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1168.876813][ T9825] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) [ 1168.915191][ T9825] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1168.957241][ T9825] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1168.991967][ T9825] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 20:30:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) [ 1169.021496][ T9825] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1169.046340][ T9825] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1169.069844][ T7640] bridge0: port 2(bridge_slave_1) entered disabled state [ 1169.077142][ T7640] bridge0: port 1(bridge_slave_0) entered disabled state [ 1169.094037][ T9825] usb 2-1: USB disconnect, device number 121 20:30:32 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) [ 1169.495614][ T7649] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1169.511095][ T7649] bridge0: port 2(bridge_slave_1) entered blocking state [ 1169.518445][ T7649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1169.527420][ T7649] bridge0: port 1(bridge_slave_0) entered blocking state [ 1169.534644][ T7649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1169.560430][ T7643] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1169.579024][ T7643] bridge0: port 2(bridge_slave_1) entered blocking state [ 1169.586269][ T7643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1169.593694][ T7643] bridge0: port 1(bridge_slave_0) entered blocking state [ 1169.600982][ T7643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1169.815034][ T9825] usb 2-1: new high-speed USB device number 122 using dummy_hcd [ 1170.074997][ T9825] usb 2-1: Using ep0 maxpacket: 8 [ 1170.225112][ T9825] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1170.233616][ T9825] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1170.244131][ T9825] usb 2-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 1170.253660][ T9825] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1170.262850][ T9825] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1170.274686][ T9825] usb 2-1: config 0 descriptor?? [ 1170.555212][ T9825] usb 2-1: string descriptor 0 read error: -71 [ 1170.563469][ T9825] usb 2-1: USB disconnect, device number 122 [ 1170.605055][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1171.294932][T22389] usb 2-1: new high-speed USB device number 123 using dummy_hcd [ 1171.534869][T22389] usb 2-1: Using ep0 maxpacket: 8 [ 1171.654970][T22389] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1171.663186][T22389] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1171.683339][T22389] usb 2-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 1171.692462][T22389] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1171.707244][T22389] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1171.732167][T22389] usb 2-1: config 0 descriptor?? 20:30:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 20:30:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0c0d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="25000000106c8108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:35 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868072016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c0000000306010800000000000000000000000005000100070000002582425e8534977311d67277a39137fed69f2fb68611925dae0464594dbdcff9d30eb15c80857966fd698d018a8d582b5ab872171b1355e71186ab9a5b576b5b12bb228c5524c54b2a9a398725a0c830293a502ff81f0699889f343447333369ce37144854d26776bf633a94aa3fd71c4d0d816ef7764468ba7971a52fb105d10b4cc877f5714b65e807eb0574782bf3a373fbc9e5f5d619c35d777d18d27aa2f7213ed787bb6336d899abae06f51bc87fd75b"], 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) [ 1171.884977][T22389] usb 2-1: string descriptor 0 read error: -71 [ 1171.902111][T22389] usb 2-1: USB disconnect, device number 123 [ 1171.946252][ T7706] bridge0: port 2(bridge_slave_1) entered disabled state [ 1171.953526][ T7706] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 20:30:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 20:30:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xa8090000}, 0x0) 20:30:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) [ 1172.318997][ T7705] bridge0: port 2(bridge_slave_1) entered disabled state [ 1172.326264][ T7705] bridge0: port 1(bridge_slave_0) entered disabled state [ 1172.344722][T22389] usb 2-1: new high-speed USB device number 124 using dummy_hcd 20:30:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xf5ffffff}, 0x0) [ 1172.594694][T22389] usb 2-1: Using ep0 maxpacket: 8 20:30:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) [ 1172.719536][T22389] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1172.729872][T22389] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1172.742893][ T7713] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1172.769920][ T7713] bridge0: port 2(bridge_slave_1) entered blocking state [ 1172.777172][ T7713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1172.784578][ T7713] bridge0: port 1(bridge_slave_0) entered blocking state [ 1172.791723][ T7713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1172.830442][T22389] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1172.877234][T22389] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1172.911140][T22389] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1172.921106][ T7714] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1172.939894][ T7714] bridge0: port 2(bridge_slave_1) entered blocking state [ 1172.947165][ T7714] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1172.954625][ T7714] bridge0: port 1(bridge_slave_0) entered blocking state [ 1172.961756][ T7714] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1172.992386][T22389] usb 2-1: New USB device found, idVendor=8086, idProduct=0172, bcdDevice=91.60 [ 1173.031445][T22389] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1173.059624][T22389] usb 2-1: config 0 descriptor?? 20:30:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 20:30:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0e0d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010748108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1173.190654][ T7747] bridge0: port 2(bridge_slave_1) entered disabled state [ 1173.197906][ T7747] bridge0: port 1(bridge_slave_0) entered disabled state [ 1173.333021][T29171] usb 2-1: USB disconnect, device number 124 [ 1173.499470][ T7753] bridge0: port 2(bridge_slave_1) entered disabled state [ 1173.506761][ T7753] bridge0: port 1(bridge_slave_0) entered disabled state [ 1173.710353][ T7752] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1173.720055][ T7752] bridge0: port 2(bridge_slave_1) entered blocking state [ 1173.727286][ T7752] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1173.735124][ T7752] bridge0: port 1(bridge_slave_0) entered blocking state [ 1173.742226][ T7752] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1173.783833][ T7757] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1173.809795][ T7757] bridge0: port 2(bridge_slave_1) entered blocking state [ 1173.819067][ T7757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1173.831869][ T7757] bridge0: port 1(bridge_slave_0) entered blocking state [ 1173.840662][ T7757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1173.948656][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1173.961673][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1174.134674][T29171] usb 2-1: new high-speed USB device number 125 using dummy_hcd [ 1174.394666][T29171] usb 2-1: Using ep0 maxpacket: 8 [ 1174.531429][T29171] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1174.539851][T29171] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1174.556521][T29171] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1174.567623][T29171] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1174.577382][T29171] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1174.587255][T29171] usb 2-1: New USB device found, idVendor=8086, idProduct=0172, bcdDevice=91.60 [ 1174.597056][T29171] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1174.613047][T29171] usb 2-1: config 0 descriptor?? 20:30:38 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000040006af3cf9efffffffffffff000000000500010007000000"], 0x1c}}, 0x40) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) [ 1174.867121][ T23] usb 2-1: USB disconnect, device number 125 20:30:38 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e100d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 20:30:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="25000000107a8108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1174.964655][ T7789] bridge0: port 2(bridge_slave_1) entered disabled state [ 1174.971894][ T7789] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 20:30:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 20:30:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xfffffff5}, 0x0) [ 1175.384513][ T23] usb 2-1: new high-speed USB device number 126 using dummy_hcd 20:30:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xfffffffc}, 0x0) 20:30:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 20:30:38 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x2) [ 1175.644579][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1175.707990][ T7792] bridge0: port 2(bridge_slave_1) entered disabled state [ 1175.715321][ T7792] bridge0: port 1(bridge_slave_0) entered disabled state [ 1175.765204][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1175.785330][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1175.821836][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1175.860955][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1175.894497][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1175.924708][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1175.934567][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1175.946756][ T23] usb 2-1: config 0 descriptor?? [ 1175.986517][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1176.014418][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1176.022534][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1176.049661][ T7797] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1176.070960][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1176.074783][ T7797] bridge0: port 2(bridge_slave_1) entered blocking state [ 1176.086168][ T7797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1176.087197][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1176.093549][ T7797] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.109920][ T7797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1176.129145][ T7800] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1176.144629][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1176.155440][ T7800] bridge0: port 2(bridge_slave_1) entered blocking state [ 1176.163672][ T7800] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1176.172473][ T7800] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.173684][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1176.179632][ T7800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1176.262005][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1176.314952][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1176.334313][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1176.362991][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1176.388675][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1176.404983][ T8980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1176.424404][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1176.454425][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1176.484421][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1176.522517][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1176.554451][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1176.574413][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1176.602408][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1176.644431][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1176.664387][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1176.684509][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1176.710319][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1176.729131][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1176.742497][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1176.771908][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1176.785916][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1176.800844][ T23] usb 2-1: USB disconnect, device number 126 [ 1177.174289][ T23] usb 2-1: new high-speed USB device number 127 using dummy_hcd [ 1177.414316][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1177.534350][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1177.542825][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1177.562321][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1177.577137][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1177.586911][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1177.596734][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1177.605979][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1177.621757][ T23] usb 2-1: config 0 descriptor?? [ 1177.666445][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1177.676517][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1177.684774][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1177.694566][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1177.703791][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1177.712501][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1177.721169][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1177.731021][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1177.748135][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1177.760686][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1177.771158][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1177.794138][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1177.874290][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1177.894392][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1177.915657][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:41 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="20000000b67150e2fd23e2b440af459ed9812a1c3a74230e", @ANYRES16=r1, @ANYBLOB="020028bd7000ffdbdf252b0000000a0006005050505050500000"], 0x20}, 0x1, 0x0, 0x0, 0x40044}, 0x40) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000280)=""/138) 20:30:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x3) 20:30:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="250000001000812f040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:41 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e180d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1177.938300][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1177.972109][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1178.019159][ T7855] bridge0: port 2(bridge_slave_1) entered disabled state [ 1178.025748][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1178.026418][ T7855] bridge0: port 1(bridge_slave_0) entered disabled state [ 1178.054308][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1178.077649][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x4) [ 1178.145065][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1178.178160][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1178.204420][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1178.228026][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 20:30:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x5) [ 1178.256693][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1178.288008][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1178.317209][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1178.374363][ T23] usb 2-1: USB disconnect, device number 127 20:30:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x6) 20:30:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x7) 20:30:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x8) 20:30:42 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x9) [ 1178.758262][ T7859] bridge0: port 2(bridge_slave_1) entered disabled state [ 1178.765579][ T7859] bridge0: port 1(bridge_slave_0) entered disabled state [ 1178.775938][ T23] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 1179.014824][ T7863] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1179.034263][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1179.037580][ T7863] bridge0: port 2(bridge_slave_1) entered blocking state [ 1179.047912][ T7863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1179.055374][ T7863] bridge0: port 1(bridge_slave_0) entered blocking state [ 1179.063401][ T7863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1179.155066][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1179.163300][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1179.174810][ T7864] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1179.184803][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1179.196569][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1179.208307][ T7864] bridge0: port 2(bridge_slave_1) entered blocking state [ 1179.208517][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1179.215456][ T7864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1179.215630][ T7864] bridge0: port 1(bridge_slave_0) entered blocking state [ 1179.225764][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1179.232442][ T7864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1179.297270][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1179.315211][ T7866] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1179.319203][ T23] usb 2-1: config 0 descriptor?? [ 1179.365374][ T7890] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1179.377185][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1179.398365][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1179.467548][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1179.504602][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1179.533810][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1179.561688][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1179.581700][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1179.617053][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1179.643714][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1179.652672][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1179.670032][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1179.683862][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1179.715619][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1179.734461][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1179.754250][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1179.774182][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1179.794140][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1179.815569][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1179.846034][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1179.881739][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1179.914226][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1179.944116][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1179.964796][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1179.985853][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1180.004008][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1180.011549][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1180.018261][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1180.032761][ T23] usb 2-1: USB disconnect, device number 2 [ 1180.035054][ T9850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1180.057686][ T9850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1180.604159][ T23] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 1180.843980][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1180.964754][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1180.972972][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1180.988844][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1181.003780][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1181.018801][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1181.032525][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1181.046862][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1181.057285][ T23] usb 2-1: config 0 descriptor?? [ 1181.095934][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1181.106074][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1181.126729][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1181.143954][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1181.152822][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1181.182824][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1181.196822][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1181.205267][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1181.224068][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1181.232158][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:30:44 executing program 1: ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f00000004c0)=&(0x7f0000000480)) syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12e688884df7aa95010000f0d31d08ea8081016091000000010902f800010000000009040000047eb17d0009050c0000000000000905820300040000000905080000"], 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f00000000c0)={0x1, [0x0]}) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f0000000440)) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000060100000000000000"], 0x14}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ttyS3\x00', 0x0, 0x0) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$TIOCSPGRP(r2, 0x5410, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f00000010c0)={{r2}, 0x0, 0x2, @inherit={0x70, &(0x7f00000003c0)={0x0, 0x5, 0x6f9, 0x5, {0x14, 0xfb69, 0x4, 0xc2, 0x2ad8}, [0x5, 0xfffffffffffffff8, 0x3, 0x7f, 0x80000000]}}, @subvolid=0x1}) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:30:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xe) 20:30:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:44 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e480d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="250000001000814e040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1181.253750][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1181.327538][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1181.358209][ T7929] bridge0: port 2(bridge_slave_1) entered disabled state [ 1181.365530][ T7929] bridge0: port 1(bridge_slave_0) entered disabled state [ 1181.374464][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xf) [ 1181.453938][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1181.473914][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1181.503925][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1181.524008][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x60) [ 1181.554226][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1181.595024][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1181.620152][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1181.664196][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1181.694013][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xf0) [ 1181.724051][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1181.747508][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1181.793210][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1181.821398][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1181.855717][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 20:30:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x300) [ 1181.904743][ T23] usb 2-1: USB disconnect, device number 3 [ 1181.946783][ T7930] bridge0: port 2(bridge_slave_1) entered disabled state [ 1181.954124][ T7930] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x500) 20:30:45 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x600) [ 1182.323841][ T23] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 1182.388049][ T7926] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1182.407164][ T7933] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1182.431281][ T7933] bridge0: port 2(bridge_slave_1) entered blocking state [ 1182.438506][ T7933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1182.445956][ T7933] bridge0: port 1(bridge_slave_0) entered blocking state [ 1182.453067][ T7933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1182.504201][ T7934] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1182.513590][ T7934] bridge0: port 2(bridge_slave_1) entered blocking state [ 1182.520769][ T7934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1182.528212][ T7934] bridge0: port 1(bridge_slave_0) entered blocking state [ 1182.535519][ T7934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1182.543331][ T23] usb 2-1: device descriptor read/64, error 18 [ 1182.561934][ T7960] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1182.814083][ T23] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 1183.004393][ T23] usb 2-1: device descriptor read/64, error 18 [ 1183.134782][ T23] usb usb2-port1: attempt power cycle [ 1183.493870][ T9850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1183.503374][ T9850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1183.843724][ T23] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 1184.014501][ T23] usb 2-1: device descriptor read/8, error -61 20:30:47 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd46a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fb17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a940000000000000000784b62935cdaea7113e2064f0fb26d3900"/237], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:30:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x700) 20:30:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:47 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e4c0d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008150040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1184.283720][ T23] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 1184.352995][ T7979] bridge0: port 2(bridge_slave_1) entered disabled state [ 1184.360281][ T7979] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x900) [ 1184.403788][ T23] usb 2-1: device descriptor read/8, error -71 20:30:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x9a8) [ 1184.524142][ T23] usb usb2-port1: unable to enumerate USB device 20:30:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xe00) 20:30:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xf00) 20:30:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x6000) 20:30:48 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xa809) [ 1184.883676][ T23] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 1185.003721][ T7986] bridge0: port 2(bridge_slave_1) entered disabled state [ 1185.011006][ T7986] bridge0: port 1(bridge_slave_0) entered disabled state [ 1185.133573][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1185.204068][ T7985] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1185.213549][ T7985] bridge0: port 2(bridge_slave_1) entered blocking state [ 1185.220666][ T7985] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1185.228687][ T7985] bridge0: port 1(bridge_slave_0) entered blocking state [ 1185.236516][ T7985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1185.263838][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1185.278463][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1185.286438][ T7988] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1185.309895][ T7988] bridge0: port 2(bridge_slave_1) entered blocking state [ 1185.311099][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1185.317067][ T7988] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1185.337302][ T7992] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1185.356253][ T7992] bridge0: port 2(bridge_slave_1) entered blocking state [ 1185.363398][ T7992] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1185.370863][ T7992] bridge0: port 1(bridge_slave_0) entered blocking state [ 1185.378537][ T7992] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1185.402679][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1185.434969][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1185.466099][ T7610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1185.476092][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1185.508273][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1185.522582][ T7983] bridge0: port 2(bridge_slave_1) entered disabled state [ 1185.541824][ T23] usb 2-1: config 0 descriptor?? [ 1185.595558][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1185.615936][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1185.642790][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1185.671289][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1185.697037][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1185.726689][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1185.750001][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1185.790332][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1185.812745][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1185.844298][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1185.852374][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1185.888638][ T8012] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1185.902958][ T8012] bridge0: port 2(bridge_slave_1) entered blocking state [ 1185.910151][ T8012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1185.910485][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1185.965873][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1185.984130][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1186.004860][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1186.024187][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1186.043793][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1186.064253][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1186.092040][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1186.127982][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1186.165059][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1186.183634][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1186.203552][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1186.219486][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1186.237510][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1186.250903][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1186.260569][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1186.289299][ T23] usb 2-1: USB disconnect, device number 8 [ 1186.863402][ T23] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 1187.103385][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1187.224174][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1187.232459][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1187.245992][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1187.257346][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1187.267594][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1187.279124][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1187.288461][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1187.303439][ T23] usb 2-1: config 0 descriptor?? [ 1187.345465][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1187.355672][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1187.364447][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1187.372488][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1187.393499][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1187.401615][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1187.415327][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1187.432253][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:30:50 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xf000) 20:30:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:50 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e600d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108020f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1187.453394][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1187.461447][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1187.469592][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1187.493461][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:30:50 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)={0x20, 0x3, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0xf, &(0x7f0000000580)="d7ae2eb7ace90bc44258e3db3e83ba47b665344ee444b53c8e777e4c92dede270ff2b7297f94cc4b721ddc0094ceeb0dca442200373521136ba5ceba0140265435648517bd74c54aa6b60bec04956791e2bbceda4598d08c6fb0717c5096519c09139f022d6811e51682d47f52a84245d624d237b50667e909ad9daeaf66c19eb804f91687199236b04b6748aad28cf2be4a2058563dc8d2bf22d08200735536534ae8c3618fef675160d63aaef499352162fd4ebd92c0f7597b4513551e19637692aea077a8152abf8413e54f7a1991090f11f5c601d557a8786954f2c9c33a099ff16abda82b1f3d2e", 0xea) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x7ff) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="dc000000", @ANYRES16=r3, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r5, @ANYBLOB="08009e00000d000080008480080002000900000008000200000000000a0005004b82012c996200000a000500ffffffffffff0000340006800800000000000000080001000600000008000200000000000800020000000000080001000001000008000200910000000a000500b074a652944700000a0001000202020202020000080902000300000038007d"], 0xdc}}, 0x0) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB="00800000", @ANYRES16=0x0, @ANYBLOB="000200000000fbdbdf250f00000008000300", @ANYRES32=r5, @ANYBLOB="080035000100000008000c00030000000400050108007e00000000000400160108000c00640000000500d50002000000"], 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r6 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$VIDIOC_ENUM_DV_TIMINGS(r7, 0xc0945662, &(0x7f0000000480)={0x43f, 0x0, [], {0x0, @reserved}}) ioctl$EVIOCGREP(r6, 0x80084503, &(0x7f0000000280)=""/138) [ 1187.534245][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1187.554044][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1187.583720][ T8046] bridge0: port 2(bridge_slave_1) entered disabled state [ 1187.590977][ T8046] bridge0: port 1(bridge_slave_0) entered disabled state [ 1187.601113][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:50 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xf0ffff) [ 1187.643817][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1187.667571][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1187.735026][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1187.769054][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1187.793368][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1187.823464][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x1000000) [ 1187.843459][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1187.873383][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1187.911575][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1187.939894][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 20:30:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x2000000) [ 1187.969193][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1187.991275][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1188.049443][ T23] usb 2-1: USB disconnect, device number 9 20:30:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x3000000) 20:30:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x4000000) 20:30:51 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x5000000) [ 1188.393872][ T8048] bridge0: port 2(bridge_slave_1) entered disabled state [ 1188.453310][ T23] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 1188.713202][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1188.803049][ T8049] bridge0: port 2(bridge_slave_1) entered disabled state [ 1188.810379][ T8049] bridge0: port 1(bridge_slave_0) entered disabled state [ 1188.833916][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1188.842131][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1188.883234][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1188.899406][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1188.914792][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1188.930731][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1188.945066][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1188.963572][ T23] usb 2-1: config 0 descriptor?? [ 1189.005329][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1189.020373][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1189.047290][ T8052] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1189.063383][ T8052] bridge0: port 2(bridge_slave_1) entered blocking state [ 1189.070535][ T8052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1189.078013][ T8052] bridge0: port 1(bridge_slave_0) entered blocking state [ 1189.085159][ T8052] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1189.094017][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1189.109551][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1189.130611][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1189.150701][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1189.173085][ T8055] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1189.193696][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1189.206473][ T8055] bridge0: port 2(bridge_slave_1) entered blocking state [ 1189.213687][ T8055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1189.230876][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:30:52 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:52 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x6000000) [ 1189.247628][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1189.273746][ T8057] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1189.298404][ T8057] bridge0: port 2(bridge_slave_1) entered blocking state [ 1189.305651][ T8057] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1189.313110][ T8057] bridge0: port 1(bridge_slave_0) entered blocking state [ 1189.320217][ T8057] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1189.331551][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1189.350033][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1189.363886][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1189.378785][ T8078] bridge0: port 2(bridge_slave_1) entered disabled state 20:30:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:52 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e680d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1189.623243][ T8081] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1189.632643][ T8081] bridge0: port 2(bridge_slave_1) entered blocking state [ 1189.639822][ T8081] bridge0: port 2(bridge_slave_1) entered forwarding state 20:30:53 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x7000000) [ 1189.723434][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1189.761199][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1189.803414][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1189.824338][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1189.843194][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1189.873457][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1189.913506][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1189.943260][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1189.983239][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1190.013214][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1190.043203][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1190.070994][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1190.091521][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1190.099831][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1190.113494][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1190.139109][ T8097] bridge0: port 2(bridge_slave_1) entered disabled state [ 1190.146395][ T8097] bridge0: port 1(bridge_slave_0) entered disabled state [ 1190.156266][ T23] usb 2-1: USB disconnect, device number 10 [ 1190.349593][ T8098] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1190.359346][ T8098] bridge0: port 2(bridge_slave_1) entered blocking state [ 1190.366548][ T8098] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1190.374056][ T8098] bridge0: port 1(bridge_slave_0) entered blocking state [ 1190.382021][ T8098] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1190.406322][ T8100] bridge0: port 2(bridge_slave_1) entered disabled state [ 1190.413658][ T8100] bridge0: port 1(bridge_slave_0) entered disabled state [ 1190.577384][ T8103] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1190.590977][ T8103] bridge0: port 2(bridge_slave_1) entered blocking state [ 1190.598169][ T8103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1190.605609][ T8103] bridge0: port 1(bridge_slave_0) entered blocking state [ 1190.612705][ T8103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1191.082998][ T23] usb 2-1: new high-speed USB device number 11 using dummy_hcd [ 1191.322985][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1191.413373][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1191.443094][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1191.451338][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 20:30:54 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f00000000c0)) 20:30:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x8000000) 20:30:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108030f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e6c0d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1191.479585][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 20:30:54 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x9000000) [ 1191.556850][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1191.596218][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1191.665594][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1191.689381][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1191.706423][ T23] usb 2-1: config 0 descriptor?? [ 1191.717814][ T8138] bridge0: port 2(bridge_slave_1) entered disabled state [ 1191.725137][ T8138] bridge0: port 1(bridge_slave_0) entered disabled state [ 1191.738336][ T23] usb 2-1: can't set config #0, error -71 [ 1191.754565][ T23] usb 2-1: USB disconnect, device number 11 20:30:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xe000000) 20:30:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xf000000) 20:30:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x60000000) [ 1192.042684][ T8142] bridge0: port 2(bridge_slave_1) entered disabled state [ 1192.050096][ T8142] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x9effffff) [ 1192.132970][ T23] usb 2-1: new high-speed USB device number 12 using dummy_hcd 20:30:55 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xa8090000) [ 1192.382962][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1192.503155][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1192.511402][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1192.559595][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1192.589396][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1192.615273][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1192.640739][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1192.665625][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1192.703379][ T23] usb 2-1: config 0 descriptor?? [ 1192.710375][ T8140] bridge0: port 2(bridge_slave_1) entered disabled state [ 1192.754888][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1192.782900][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1192.790983][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1192.843713][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1192.863058][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1192.871144][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1192.922868][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1192.930923][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1192.960082][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1192.992866][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1193.000942][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1193.021407][ T8145] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1193.037867][ T8145] bridge0: port 2(bridge_slave_1) entered blocking state [ 1193.043200][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1193.045094][ T8145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1193.060007][ T8145] bridge0: port 1(bridge_slave_0) entered blocking state [ 1193.067190][ T8145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1193.079208][ T8147] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1193.092084][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1193.095209][ T8147] bridge0: port 2(bridge_slave_1) entered blocking state [ 1193.106072][ T8147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1193.113731][ T8147] bridge0: port 1(bridge_slave_0) entered blocking state [ 1193.120877][ T8147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1193.133145][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1193.162925][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1193.169832][ T8148] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1193.193820][ T8148] bridge0: port 2(bridge_slave_1) entered blocking state [ 1193.202424][ T8148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1193.202819][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1193.262873][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1193.274020][ T8171] bridge0: port 2(bridge_slave_1) entered disabled state [ 1193.292947][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1193.313007][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1193.352868][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1193.372854][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1193.403025][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1193.432868][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1193.467349][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1193.492792][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1193.500356][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1193.532885][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1193.565028][ T23] usb 2-1: USB disconnect, device number 12 [ 1193.575602][ T8174] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1193.592472][ T8174] bridge0: port 2(bridge_slave_1) entered blocking state [ 1193.599638][ T8174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1193.982761][ T23] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 1194.222853][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1194.342788][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1194.351066][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1194.362976][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1194.374152][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1194.383906][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1194.394136][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1194.403267][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1194.413508][ T23] usb 2-1: config 0 descriptor?? [ 1194.454765][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1194.465657][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1194.477310][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1194.486406][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1194.494931][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1194.503448][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1194.511576][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1194.520093][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1194.545078][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:30:57 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504563ba059ada1428902c4d221af7b7fa3a6a4e5fb87993d77242994f63a5acf7c434e95f3208835f511dffd0bc2"], 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:30:57 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xf0ffffff) 20:30:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:57 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e740d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:30:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:30:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108050f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1194.563659][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1194.579818][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1194.592013][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1194.660453][ T8217] bridge0: port 2(bridge_slave_1) entered disabled state [ 1194.667754][ T8217] bridge0: port 1(bridge_slave_0) entered disabled state [ 1194.677375][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1194.722829][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xf5ffffff) [ 1194.773742][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1194.832824][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1194.852831][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1194.872995][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1194.902769][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1194.923095][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:30:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xfcffffff) [ 1194.962775][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1195.002843][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1195.032854][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1195.051623][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 20:30:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xfffff000) [ 1195.089046][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1195.122752][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1195.122889][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1195.187315][ T23] usb 2-1: USB disconnect, device number 13 20:30:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xffffff7f) 20:30:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xffffff9e) [ 1195.494647][ T8218] bridge0: port 2(bridge_slave_1) entered disabled state [ 1195.501888][ T8218] bridge0: port 1(bridge_slave_0) entered disabled state 20:30:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xfffffff0) [ 1195.582686][ T23] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 1195.832783][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1195.868489][ T8220] bridge0: port 2(bridge_slave_1) entered disabled state [ 1195.962789][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1195.974658][ T8222] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1195.985528][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1196.004011][ T8222] bridge0: port 2(bridge_slave_1) entered blocking state [ 1196.012423][ T8222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1196.019925][ T8222] bridge0: port 1(bridge_slave_0) entered blocking state [ 1196.027061][ T8222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1196.035601][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1196.063210][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1196.076125][ T23] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x4 has invalid maxpacket 59 [ 1196.092362][ T8224] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1196.103952][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1196.117299][ T8224] bridge0: port 2(bridge_slave_1) entered blocking state [ 1196.125552][ T8224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1196.134215][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1196.134329][ T8224] bridge0: port 1(bridge_slave_0) entered blocking state [ 1196.150169][ T8224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1196.165809][ T23] usb 2-1: config 0 descriptor?? [ 1196.187046][ T8223] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1196.214502][ T8225] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1196.226372][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1196.240616][ T8225] bridge0: port 2(bridge_slave_1) entered blocking state [ 1196.247877][ T8225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1196.264107][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1196.291896][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1196.313880][ T8246] bridge0: port 2(bridge_slave_1) entered disabled state [ 1196.336278][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1196.359289][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1196.376853][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1196.395824][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1196.406974][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1196.437691][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1196.456180][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1196.473776][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1196.497143][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1196.532586][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1196.552546][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1196.582631][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1196.602822][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1196.632564][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1196.652574][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1196.668435][ T8248] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1196.672655][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1196.695550][ T8248] bridge0: port 2(bridge_slave_1) entered blocking state [ 1196.702740][ T8248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1196.714048][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1196.742566][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1196.765458][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1196.784934][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1196.811756][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1196.833698][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1196.850498][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1196.863776][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1196.888764][ T23] usb 2-1: USB disconnect, device number 14 [ 1196.983154][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1196.991274][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1197.007395][ T9825] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1197.402468][ T23] usb 2-1: new high-speed USB device number 15 using dummy_hcd [ 1197.642442][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1197.762980][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1197.771211][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1197.791120][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1197.807040][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1197.816812][ T23] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x4 has invalid maxpacket 59 [ 1197.826723][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1197.840425][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1197.856882][ T23] usb 2-1: config 0 descriptor?? [ 1197.877708][ T8223] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1197.914624][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1197.923153][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1197.931207][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1197.942657][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1197.953453][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1197.961541][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1197.969846][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1197.978006][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1197.986138][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1197.994238][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:31:01 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) socket$rxrpc(0x21, 0x2, 0x2) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000030201080000000000000000000000000500010007000000"], 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:31:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xfffffff5) 20:31:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:31:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:31:01 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e7a0d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:31:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108060f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1198.022422][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1198.042807][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1198.092101][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1198.124019][ T8290] bridge0: port 2(bridge_slave_1) entered disabled state [ 1198.131258][ T8290] bridge0: port 1(bridge_slave_0) entered disabled state [ 1198.132490][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:31:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xfffffffc) [ 1198.202864][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1198.265234][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1198.312540][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1198.332640][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1198.362382][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1198.382436][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:31:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xf0ffffffffffff) [ 1198.412647][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1198.462457][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1198.494148][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1198.525125][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1198.557289][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 20:31:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x100000000000000) [ 1198.582495][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1198.605281][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1198.645904][ T23] usb 2-1: USB disconnect, device number 15 20:31:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x200000000000000) 20:31:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x300000000000000) 20:31:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x400000000000000) [ 1198.991033][ T8291] bridge0: port 2(bridge_slave_1) entered disabled state [ 1198.998334][ T8291] bridge0: port 1(bridge_slave_0) entered disabled state [ 1199.042257][ T23] usb 2-1: new high-speed USB device number 16 using dummy_hcd [ 1199.298003][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1199.332509][ T8292] bridge0: port 2(bridge_slave_1) entered disabled state [ 1199.423156][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1199.431388][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1199.451716][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1199.463655][ T8296] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1199.472672][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1199.484685][ T8296] bridge0: port 2(bridge_slave_1) entered blocking state [ 1199.489157][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1199.491816][ T8296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1199.507838][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1199.508877][ T8296] bridge0: port 1(bridge_slave_0) entered blocking state [ 1199.517923][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1199.524824][ T8296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1199.563876][ T23] usb 2-1: config 0 descriptor?? [ 1199.578295][ T8297] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1199.600665][ T8297] bridge0: port 2(bridge_slave_1) entered blocking state [ 1199.607933][ T8297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1199.608490][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1199.615357][ T8297] bridge0: port 1(bridge_slave_0) entered blocking state [ 1199.630493][ T8297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1199.663572][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1199.700805][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1199.723294][ T8299] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1199.727806][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1199.745659][ T8299] bridge0: port 2(bridge_slave_1) entered blocking state [ 1199.752865][ T8299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1199.760463][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1199.778452][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1199.819445][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1199.852673][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1199.860747][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1199.902279][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1199.912557][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1199.952244][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1199.968192][ T8320] bridge0: port 2(bridge_slave_1) entered disabled state [ 1199.975674][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1200.002262][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1200.022228][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1200.042677][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1200.062784][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1200.084062][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1200.113554][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1200.142314][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1200.146005][ T8322] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1200.162214][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1200.166356][ T8322] bridge0: port 2(bridge_slave_1) entered blocking state [ 1200.176197][ T8322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1200.182463][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1200.208511][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1200.232325][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1200.238894][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1200.254622][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1200.293623][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1200.326320][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1200.350566][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1200.375494][ T23] usb 2-1: USB disconnect, device number 16 [ 1200.852122][ T23] usb 2-1: new high-speed USB device number 17 using dummy_hcd [ 1201.092128][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1201.212572][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1201.221450][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1201.234439][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1201.245787][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1201.255863][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1201.267501][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1201.277104][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1201.291102][ T23] usb 2-1: config 0 descriptor?? [ 1201.344149][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1201.361731][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1201.371565][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1201.390363][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1201.398745][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1201.416081][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1201.430700][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1201.448821][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1201.459996][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1201.477984][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1201.490322][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1201.509456][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset 20:31:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:31:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x500000000000000) 20:31:04 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:31:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0012000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:31:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108070f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1201.553331][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1201.572108][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1201.613329][ T8364] bridge0: port 2(bridge_slave_1) entered disabled state [ 1201.632136][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:31:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x600000000000000) [ 1201.672164][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1201.692073][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1201.756140][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1201.793417][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1201.822165][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:31:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x700000000000000) 20:31:05 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000340)={r2, 0x80000}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000002580)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GET(r3, &(0x7f0000002740)={0x0, 0x0, &(0x7f0000002700)={&(0x7f00000027c0)={0x14, r4, 0x701, 0x0, 0x0, {0x26}}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000003c0)={0x1cc, r4, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x10001}, {0x6, 0x11, 0x825b}, {0x8, 0x13, 0xfff}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1ff}, {0x6, 0x11, 0x1}, {0x8, 0x13, 0x2}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x6}, {0x8}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x800}, {0x8, 0x13, 0x4}, {0x5, 0x14, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x8}, {0x6, 0x11, 0x6d8}, {0x8, 0x13, 0x6}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x401}, {0x6, 0x11, 0xfff7}, {0x8, 0x13, 0x3}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffffff8}, {0x6, 0x11, 0x4}, {0x8, 0x13, 0x4}, {0x5, 0x14, 0x1}}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x80}, 0x8000010) [ 1201.862975][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1201.882127][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1201.922201][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1201.958958][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 20:31:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x800000000000000) [ 1202.007072][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1202.045980][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1202.070915][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1202.113929][ T23] usb 2-1: USB disconnect, device number 17 [ 1202.159084][ T8366] bridge0: port 2(bridge_slave_1) entered disabled state [ 1202.166351][ T8366] bridge0: port 1(bridge_slave_0) entered disabled state 20:31:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x900000000000000) 20:31:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xe00000000000000) 20:31:05 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xf00000000000000) [ 1202.541989][ T23] usb 2-1: new high-speed USB device number 18 using dummy_hcd [ 1202.742340][ T8368] bridge0: port 2(bridge_slave_1) entered disabled state [ 1202.749655][ T8368] bridge0: port 1(bridge_slave_0) entered disabled state [ 1202.802038][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1202.912417][ T8369] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1202.921902][ T8369] bridge0: port 2(bridge_slave_1) entered blocking state [ 1202.922231][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1202.928987][ T8369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1202.942885][ T8371] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1202.959966][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1202.978945][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1202.979304][ T8371] bridge0: port 2(bridge_slave_1) entered blocking state [ 1202.997010][ T8371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1203.004459][ T8371] bridge0: port 1(bridge_slave_0) entered blocking state [ 1203.006654][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1203.011567][ T8371] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1203.048630][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1203.073312][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1203.095350][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1203.117541][ T23] usb 2-1: config 0 descriptor?? [ 1203.164700][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1203.204449][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:31:06 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0020000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:31:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:31:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x6000000000000000) 20:31:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1203.272583][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1203.317828][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1203.338233][ T8364] bridge0: port 2(bridge_slave_1) entered disabled state [ 1203.343830][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1203.379371][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1203.399604][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1203.439371][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1203.462855][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1203.484901][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1203.533722][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1203.584483][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1203.631975][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1203.652084][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1203.671999][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1203.701928][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1203.723958][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1203.730948][ T8396] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1203.761976][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1203.762373][ T8396] bridge0: port 2(bridge_slave_1) entered blocking state [ 1203.776037][ T8396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1203.782023][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1203.801918][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1203.837071][ T8980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1203.853218][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1203.872147][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:31:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108120f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:31:07 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x9effffff00000000) 20:31:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1203.889562][ T8416] bridge0: port 2(bridge_slave_1) entered disabled state [ 1203.896931][ T8416] bridge0: port 1(bridge_slave_0) entered disabled state [ 1203.905819][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1203.978102][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1204.019248][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1204.049548][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1204.073523][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1204.135258][ T23] usb 2-1: USB disconnect, device number 18 [ 1204.531781][ T23] usb 2-1: new high-speed USB device number 19 using dummy_hcd [ 1204.729822][ T8420] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1204.739310][ T8420] bridge0: port 2(bridge_slave_1) entered blocking state [ 1204.746577][ T8420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1204.754178][ T8420] bridge0: port 1(bridge_slave_0) entered blocking state [ 1204.761287][ T8420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1204.781936][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1204.803883][ T8440] bridge0: port 2(bridge_slave_1) entered disabled state [ 1204.902322][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1204.912873][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1204.933040][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 20:31:08 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x48, r0, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x34, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}]}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x44) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000280)=""/138) 20:31:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xa809000000000000) 20:31:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1204.957750][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1204.976479][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 20:31:08 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1205.014241][ T8441] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1205.032921][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1205.040231][ T8441] bridge0: port 2(bridge_slave_1) entered blocking state [ 1205.049128][ T8441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1205.082965][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 20:31:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xf0ffffff00000000) [ 1205.145496][ T8468] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1205.156307][ T23] usb 2-1: config 0 descriptor?? [ 1205.182010][ T23] usb 2-1: can't set config #0, error -71 [ 1205.203500][ T23] usb 2-1: USB disconnect, device number 19 20:31:08 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0025000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:31:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xf5ffffff00000000) 20:31:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xfcffffff00000000) [ 1205.491201][ T8457] bridge0: port 2(bridge_slave_1) entered disabled state 20:31:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xffffff7f00000000) [ 1205.571783][ T23] usb 2-1: new high-speed USB device number 20 using dummy_hcd [ 1205.802219][ T8459] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1205.812074][ T8459] bridge0: port 2(bridge_slave_1) entered blocking state [ 1205.819288][ T8459] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1205.831649][ T23] usb 2-1: Using ep0 maxpacket: 8 20:31:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="25000000100081084e0f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:31:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xffffffff00000000) [ 1205.953066][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1205.961315][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1206.018004][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1206.054171][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 20:31:09 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0xfffffffffffff000) [ 1206.076437][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1206.100049][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1206.153887][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1206.175530][ T23] usb 2-1: config 0 descriptor?? [ 1206.209151][ T8465] bridge0: port 2(bridge_slave_1) entered disabled state [ 1206.216479][ T8465] bridge0: port 1(bridge_slave_0) entered disabled state [ 1206.244036][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1206.263468][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1206.282091][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1206.310648][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1206.339566][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1206.366629][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1206.394866][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1206.429753][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1206.470062][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1206.497655][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1206.517493][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1206.542473][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1206.566638][ T8480] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1206.576258][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1206.597529][ T8480] bridge0: port 2(bridge_slave_1) entered blocking state [ 1206.604791][ T8480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1206.612273][ T8480] bridge0: port 1(bridge_slave_0) entered blocking state [ 1206.619385][ T8480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1206.641634][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1206.672501][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1206.702408][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1206.730505][ T8482] device veth0_to_team entered promiscuous mode [ 1206.737098][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1206.764003][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1206.801721][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1206.831688][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1206.861813][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1206.895305][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1206.923625][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1206.945915][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1206.968857][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1207.006118][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1207.027504][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1207.064450][ T23] usb 2-1: USB disconnect, device number 20 [ 1207.108566][ T8499] bridge0: port 2(bridge_slave_1) entered disabled state [ 1207.401843][ T8500] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1207.412156][ T8500] bridge0: port 2(bridge_slave_1) entered blocking state [ 1207.419309][ T8500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1207.452174][ T23] usb 2-1: new high-speed USB device number 21 using dummy_hcd [ 1207.474039][T22389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1207.610322][ T8523] bridge0: port 2(bridge_slave_1) entered disabled state [ 1207.711988][ T8532] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1207.721353][ T8532] bridge0: port 2(bridge_slave_1) entered blocking state [ 1207.728501][ T8532] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1207.736383][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1207.862217][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1207.870460][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1207.892295][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1207.910132][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1207.920171][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1207.938319][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1207.949146][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1207.966640][ T23] usb 2-1: config 0 descriptor?? [ 1208.013757][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1208.022140][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1208.030257][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1208.041695][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1208.049883][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1208.057968][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:31:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:31:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x7}}, 0x8083) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000002c0)=0x22040, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000140)='NLBL_UNLBL\x00') r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$BLKFLSBUF(r5, 0x1261, &(0x7f0000000300)=0x7) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB="880000005cb1b9a28d500ed9dd82a9380caea53346734eaa9c7cbed16a8221e1d612545cf763d7fc3c43d1b20cec89ccfca600"/66, @ANYRES16=r4, @ANYBLOB="020028bd7000fcdbdf250300000008000500ac1414aa0500010001000000140006006272696467655f736c6176655f31000008000400ac1414aa1400060067656e65766531000000000000000000140002000000000000000000000000000000000008000400e000000208000500e000000208000500e00000010500010000000000"], 0x88}, 0x1, 0x0, 0x0, 0x4}, 0x4001) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f00000000c0)=0xbe03) 20:31:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:31:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e004e000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:31:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108500f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1208.101606][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1208.109676][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:31:11 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x8feb78bd73a8c924}, 0x9c) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x9, 0x0, 0x2, 0x1, r2}, 0x10) [ 1208.205045][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1208.239967][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 20:31:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {0xa}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x8010) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000100)={0x8, 0x80000000, 0x20, 0x6f380bfe254ab614, r2}) [ 1208.271541][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1208.326533][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1208.367859][ T8565] bridge0: port 2(bridge_slave_1) entered disabled state [ 1208.375211][ T8565] bridge0: port 1(bridge_slave_0) entered disabled state [ 1208.386159][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:31:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) semctl$IPC_INFO(0xffffffffffffffff, 0x1, 0x3, &(0x7f00000000c0)=""/46) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5c, 0x2, 0x6, 0x201, 0x0, 0x0, {0x3}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x3}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x81}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x7}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x5c}}, 0x8000) [ 1208.421572][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1208.451523][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1208.491637][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1208.531877][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1208.561547][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1208.581558][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1208.612861][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:31:11 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x2, 0x4}, 0x8) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSPGRP(r6, 0x5410, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="dc000000", @ANYRES16=r6, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r5, @ANYBLOB="08009e00000d000080008480080002000900000008000200000000000a0005004b82012c996200000a000500ffffffffffff0000340006800800000000000000080001000600000008000200000000000800020000000000080001000001000008000200910000000a000500b074a652944700000a0001000202020202020000080902000300000038007dc454eed0725f8bfbd036c4e31331ee7e1196cbf4e19496afb97586d1314c9bb225aeb9ce8712f72c2388c75f2e894d536334097f32c2a72aea"], 0xdc}}, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x200, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="21000000020603000000000000000000000000000c000300686173683a69700005000400000000000900020073797a3200000000050005000700"/68], 0x44}}, 0x0) [ 1208.661627][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1208.692367][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1208.732019][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device [ 1208.760741][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1208.794648][ T8593] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1208.801188][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1208.836339][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1208.859844][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1208.886140][ T8563] bridge0: port 2(bridge_slave_1) entered disabled state [ 1208.899595][ T23] usb 2-1: USB disconnect, device number 21 20:31:12 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000140)={0x6, 0x3, @name="3cd8f25e33006ba621f7aefda21e4402780e24f2d753d8357099af334fb5ddd6"}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1c, &(0x7f0000000300)=[@in6={0xa, 0x0, 0x0, @remote, 0x4}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x8feb78bd73a8c924}, 0x9c) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x2, 0x8877, 0x20a, 0x6, 0xfffffffd, 0x5, 0xc7b2, 0x4, r2}, 0x20) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4000, &(0x7f00000000c0)=0x10000, 0x8, 0x2) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) [ 1209.259545][ T8564] device wlan2 entered promiscuous mode [ 1209.265862][ T8569] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1209.282659][ T8569] bridge0: port 2(bridge_slave_1) entered blocking state [ 1209.289849][ T8569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1209.297331][ T8569] bridge0: port 1(bridge_slave_0) entered blocking state [ 1209.304515][ T8569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1209.332710][ T8582] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1209.356530][ T8582] bridge0: port 2(bridge_slave_1) entered blocking state [ 1209.363743][ T8582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1209.371145][ T8582] bridge0: port 1(bridge_slave_0) entered blocking state 20:31:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1209.378299][ T8582] bridge0: port 1(bridge_slave_0) entered forwarding state 20:31:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1209.423912][ T8572] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1209.446103][ T8572] bridge0: port 2(bridge_slave_1) entered blocking state [ 1209.454224][ T8572] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1209.524837][T22389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:31:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0010000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1209.612297][ T23] usb 2-1: new high-speed USB device number 22 using dummy_hcd [ 1209.651160][ T8576] bridge0: port 2(bridge_slave_1) entered disabled state 20:31:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}}) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) [ 1209.851379][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1209.914472][ T8598] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1209.936188][ T8598] bridge0: port 2(bridge_slave_1) entered blocking state [ 1209.943486][ T8598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1209.972209][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1209.980438][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1210.007901][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 20:31:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0xc01c64ae, &(0x7f0000000200)={0xffff0000, 0x9, 0x10001, 0xffff, 0xff, 0x1b, 0x20}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r2, 0x100, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0x1, 0x26}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x4) 20:31:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040280ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1210.051091][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1210.083717][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has invalid wMaxPacketSize 0 [ 1210.144907][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 20:31:13 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0xf4, 0x0, 0x9, 0x101, 0x0, 0x0, {0xc, 0x0, 0x7}, [@NFCTH_NAME={0x9, 0x1, 'syz1\x00'}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1}}, @NFCTH_TUPLE={0x88, 0x2, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}}, {0x14, 0x4, @local}}}, @CTA_TUPLE_ZONE={0x6}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x764c}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_STATUS={0x8}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x3}, @NFCTH_TUPLE={0x1c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x1}, 0x884) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="44000000020603000000000000000000000000000c000300686173683a69700100000400000000008aa41db834c9709bf9091cc00073797a32000000000500050002000000050001000700000088bfae61240c0da7254c4d6702b652aacb140122e204da5a9ee7960f5abc77600c95cc7c04200ad2139d138f73cd94dde6718b2608890d13d4c2ad5216d56a7c8aaf03c14203416923afb4bb6cd226c0b92a49bbd6ac6631ec686a9d5ec522b1cc57dde2dc2659a5ea4b568534391cfe21ef631fc6ba83af6ba4753135c3add76cd2fd0161c438"], 0x44}}, 0x0) [ 1210.191502][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1210.230360][ T23] usb 2-1: config 0 descriptor?? [ 1210.293495][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1210.316025][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1210.354202][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1210.391348][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1210.412202][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1210.429969][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1210.453879][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1210.475824][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1210.492519][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1210.500744][ T23] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1210.525873][ T23] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1210.556348][ T23] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1210.568769][ T8610] bridge0: port 2(bridge_slave_1) entered disabled state [ 1210.576067][ T8610] bridge0: port 1(bridge_slave_0) entered disabled state [ 1210.753101][ T8611] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1210.770858][ T8611] bridge0: port 2(bridge_slave_1) entered blocking state [ 1210.778100][ T8611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1210.785551][ T8611] bridge0: port 1(bridge_slave_0) entered blocking state [ 1210.792701][ T8611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1210.936921][ T8613] bridge0: port 2(bridge_slave_1) entered disabled state [ 1210.944253][ T8613] bridge0: port 1(bridge_slave_0) entered disabled state [ 1211.063260][ T8614] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1211.081284][ T8614] bridge0: port 2(bridge_slave_1) entered blocking state [ 1211.088502][ T8614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1211.095989][ T8614] bridge0: port 1(bridge_slave_0) entered blocking state [ 1211.103234][ T8614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1211.128072][ T8616] device team0 entered promiscuous mode [ 1211.142500][ T8616] device team_slave_0 entered promiscuous mode [ 1211.149441][ T8616] device team_slave_1 entered promiscuous mode [ 1211.565640][ T8631] bridge0: port 2(bridge_slave_1) entered disabled state 20:31:14 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009460db9de457672111b62b62d964bcc040000047eb17d0009050c000000000000090182030004a3f90973ca7913979b8a7736f6e078e905979ed2e2c70109980313359123a072a2c32f957ac9396d09d113b4833d17f0dbe6cf96b40aa55b9114e727c90b0002f9ed47c1b64364d86685ba0f96a02533a3cbd2082358074fe6d6af675528a1c182dce7439cbd568982defdd3c97c6fc2553e3359554962cde405a69b867b"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:31:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="50000000020603000000000000000000000000000c000300686173683a69700005000400000000000900020073797a3200000000050005000200007400000000efe09abe36729fa1d468fa95ce6ceb839cd7df48"], 0x50}}, 0x40020) 20:31:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:31:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1211.651190][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1211.680412][ T8658] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 20:31:15 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$SNDRV_PCM_IOCTL_DROP(r0, 0x4143, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f00000010c0)={0x0, 0x7}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000000206030000000c0000020000000000040c000300526173683a697000050004000000000009000200731c1c32000000000500050002000000050001ff00000000"], 0x44}}, 0x0) [ 1211.696983][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1211.751349][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1211.781214][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1211.821361][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying 20:31:15 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f00000000c0)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) [ 1211.872166][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1211.901258][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1211.921381][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1211.931693][ T8633] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1211.950939][ T8633] bridge0: port 2(bridge_slave_1) entered blocking state [ 1211.958187][ T8633] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1211.969268][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1212.001195][ T23] i2400m_usb 2-1:0.0: BM-ACK: URB error -71, retrying [ 1212.031295][ T23] i2400m_usb 2-1:0.0: bm: maximum errors in notification URB exceeded; resetting device 20:31:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_GET_THP_DISABLE(0x2a) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4400000002060300000000000000008e010000000c000300687973683a697000050004000000020073797a32ffffbfff0500050002000000050001200700000050f4465d9fef9b9e1de47866a117436e15a606afc70b75ac5bc7fbe0aaa4dca8b61bb1a2e9be9224f4e7843ce91b8fc31686b39a46ea66aa60b245d8305cc9f3c49ddde95b952eacb37db5bc93a69edc371a7ad677c2b810ae11c6a59eb0e79610f673750581000000000000002591c0703ca54e4bdec73e6cd7a3fdf984b3b1f6e06f"], 0x44}}, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$SNDCTL_SEQ_RESETSAMPLES(r1, 0x40045109, &(0x7f0000000000)=0x3) 20:31:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0012000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1212.085076][ T23] i2400m_usb 2-1:0.0: boot-mode cmd -1: error waiting for an ack: -71 [ 1212.129186][ T23] i2400m_usb 2-1:0.0: read mac addr: bootrom init failed: -71 [ 1212.162652][ T23] i2400m_usb 2-1:0.0: cannot setup device: -71 [ 1212.164406][ T8676] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1212.190719][ T23] i2400m_usb: probe of 2-1:0.0 failed with error -71 [ 1212.230362][ T23] usb 2-1: USB disconnect, device number 22 20:31:15 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket(0x200000100000011, 0x803, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="dc000000", @ANYRES16=r7, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r9, @ANYBLOB="08009e00000d000080008480080002000900000008000200000000000a0005004b82012c996200000a000500ffffffffffff0000340006800800000000000000080001000600000008000200000000000800020000000000080001000001000008000200910000000a000500b074a652944700000a0001000202020202020000080902000300000038007d"], 0xdc}}, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xac, r7, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2c}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4b}, @NL80211_ATTR_REG_RULES={0x78, 0x22, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0xfc}]}, {0x44, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x4}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x3}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x5443efb6}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x2}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x5}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x6}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x1}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0xfffffffb}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x8}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x9}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x1ae}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x4}]}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x52}]}, 0xac}, 0x1, 0x0, 0x0, 0x4004}, 0x40000) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eefffffffffffff7000000", @ANYRES32=r10, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0x40, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_dsmark={{0xb, 0x1, 'dsmark\x00'}, {0x10, 0x2, [@TCA_DSMARK_SET_TC_INDEX={0x4}, @TCA_DSMARK_INDICES={0x6, 0x1, 0x8}]}}]}, 0x40}}, 0x0) sendto$packet(r2, &(0x7f0000000080)="480a838543a9914b8c53fd110800", 0xe, 0x0, &(0x7f00000002c0)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r10}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e22}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x200088c0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) [ 1212.299468][ T8649] bridge0: port 2(bridge_slave_1) entered disabled state [ 1212.524127][ T8651] bridge0: port 2(bridge_slave_1) entered blocking state [ 1212.531345][ T8651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1212.558256][ T3159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:31:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040380ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1212.621120][ T23] usb 2-1: new high-speed USB device number 23 using dummy_hcd [ 1212.724607][ T8659] bridge0: port 2(bridge_slave_1) entered disabled state [ 1212.732030][ T8659] bridge0: port 1(bridge_slave_0) entered disabled state [ 1212.871082][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 1212.991840][ T23] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1213.000054][ T23] usb 2-1: config 0 has an invalid descriptor of length 163, skipping remainder of the config [ 1213.036789][ T23] usb 2-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 1213.061105][ T23] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1213.070162][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1213.113247][ T23] usb 2-1: config 0 descriptor?? [ 1213.176155][ T8661] bridge0: port 2(bridge_slave_1) entered disabled state [ 1213.183397][ T8661] bridge0: port 1(bridge_slave_0) entered disabled state [ 1213.299869][ T8662] bridge0: port 2(bridge_slave_1) entered blocking state [ 1213.307020][ T8662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1213.315950][ T8662] bridge0: port 1(bridge_slave_0) entered blocking state [ 1213.323113][ T8662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1213.333137][ T8664] bridge0: port 2(bridge_slave_1) entered blocking state [ 1213.340230][ T8664] bridge0: port 2(bridge_slave_1) entered forwarding state 20:31:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1213.347681][ T8664] bridge0: port 1(bridge_slave_0) entered blocking state [ 1213.354976][ T8664] bridge0: port 1(bridge_slave_0) entered forwarding state 20:31:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1213.611277][ T7610] usb 2-1: USB disconnect, device number 23 [ 1213.629181][ T8700] bridge0: port 2(bridge_slave_1) entered disabled state [ 1213.811458][ T8701] __nla_validate_parse: 5 callbacks suppressed [ 1213.811470][ T8701] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1213.851184][ T8701] bridge0: port 2(bridge_slave_1) entered blocking state [ 1213.858402][ T8701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1213.891080][ T8696] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1214.004845][ T8716] bridge0: port 2(bridge_slave_1) entered disabled state [ 1214.012172][ T8716] bridge0: port 1(bridge_slave_0) entered disabled state [ 1214.261348][ T8719] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1214.271146][ T8719] bridge0: port 2(bridge_slave_1) entered blocking state [ 1214.278388][ T8719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1214.285911][ T8719] bridge0: port 1(bridge_slave_0) entered blocking state [ 1214.293053][ T8719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1214.395427][ T8721] bridge0: port 2(bridge_slave_1) entered disabled state [ 1214.402651][T29171] usb 2-1: new high-speed USB device number 24 using dummy_hcd [ 1214.512844][ T8724] bridge0: port 2(bridge_slave_1) entered disabled state [ 1214.520102][ T8724] bridge0: port 1(bridge_slave_0) entered disabled state [ 1214.650918][T29171] usb 2-1: Using ep0 maxpacket: 8 [ 1214.681555][ T8723] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1214.692266][ T8723] bridge0: port 2(bridge_slave_1) entered blocking state [ 1214.699389][ T8723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1214.729166][ T8725] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1214.745123][ T8725] bridge0: port 2(bridge_slave_1) entered blocking state [ 1214.752360][ T8725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1214.759762][ T8725] bridge0: port 1(bridge_slave_0) entered blocking state [ 1214.766903][ T8725] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1214.792588][T29171] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1214.813452][T29171] usb 2-1: config 0 has an invalid descriptor of length 163, skipping remainder of the config [ 1214.842665][T29171] usb 2-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 1214.865204][T29171] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1214.888273][T29171] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1214.931970][T29171] usb 2-1: config 0 descriptor?? 20:31:18 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000340)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582020004000000090508000000000000090504279c5b6660674c024bdd1ce613369304276d9676397f67099b41d13bdf7a7b8881358f1c6148d3030781efb35d1c7b76e94a8f"], 0x0) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000280)=""/138) 20:31:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/bus/input/handlers\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000001700)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000017c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x1000c202}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)={0x14, r2, 0x8, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x3615b4a7e205e94b) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000001680)={@local, 0x7c}) sendmsg$RDMA_NLDEV_CMD_RES_GET(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYRESOCT], 0x30}, 0x1, 0x0, 0x0, 0x60050}, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@initdev, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) preadv2(r3, &(0x7f0000001480)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x2) sendmsg$nl_netfilter(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)={0x1338, 0xd, 0xb, 0x5, 0x70bd25, 0x25dfdbfe, {0xa, 0x0, 0x6}, [@nested={0x1322, 0x8b, 0x0, 0x1, [@generic="0f95ce147a8ff0a39bd32d742385c3c3c7b8ae55e1b461c129309c28015e94681199801071e444fb9602e37258726d326dd41dbff0334d280e45fc75409596658999be801941bc1b88b61d35c755612ef128fd0e8a9becaf13adc6a10c92e3ca7d575efa363fd51db822d1e2140b851e61dccfd0cb27e2a18e20b774c0f087c88838c1ddb56f7a965156c683187ba7e6da0949ac88859e13f557b927fd2fb823627d13e0055376c515976828e9e4a39833c6fa3fe9528a6cf6237e063c4d135957be8fe530acf85023c0ef7fc93c9e069da288e0807b4865bc23ab4ce02956bd691e581a60231e16838ca363395533998cb6c6df3d8ca3470207ec5bed759a85612ed139315b81fbb5e457321e50849c23f8dba67b34b20f6182bf2fac8386d6add94a4847a96fa6cdd27660fba80810741e79af663a2b9d75e4cd7a63bee1ebb9eaa620f2966a6420b9f27db1238821b52b250a95fd9315d320f2a8ab4794a27bbc0b8d33cd04b934e9d799dc94e884371937d39b27ee5da1791e0fbf607424e2084e45d9f42c42f905ee22cf1a6c7fabf9221cf7337925b112ab1dd94db1ed0ae9594836b3853195ee0702676c7de2f141ba092c4a4b5416ea6dcc2145d7de5b36ce22c49401de8ed1edb3267354bab24801ec5d0a8e8eb47c7240467604ae8d638c85f06e63911acf0186ab43015a6b3780e493abc7bf1ac2f94ee5f9ba7842636804051b46d02d3ceff2cf68cc6b90af319f5b114ef4b132268136eec770c0e5d7a1a5198c0f6d71e6d336e0ac496c514347c1ca023b997817e66b5f9c7b17d5414bf8c056f90c5b032c1283df6545ad704ea946dec64c2bb82d1e8d8398b783409f9a85a12ee90094152e6f0a5b5b2911ed41958f2eead112d9f771fdf91eb82aa8b8df22846084ec77812c93e1f800c73f79271c3a87f57b2fb7667ff6186a7a3b5eb44e02dbcf4873723a7ba31507f8e4e4236299df5c8f14954b36fa3a4f3cf04902670476e7cd81d8a76439ba2b079a49a7358fff4646ada4ae3bddf27325b65cd8a1e0e47a008abbed5cdeb8d710140b8f8159e9d4f6feb6636664d87e1886380970dd5783eae2328992ed3f3da2525690873df4ac432c3fe2c1232a1f94624b536171b4a1b2efbdd4f4651249c6571cee7e493318bdc7fd8c9d1568c46ba46ae0e086c83ddc503b9ff82831deb57fd89b075801f8b6f0a2ad08409417e7a1a92b4193aba45dd67da329a7909229bbd44c9403b0a8304199b445b735a5725996b03c5c0160320e8200827117986891e3e37d97692dfe503563184ccc9e20b9d5e48b3cf479732c52408735223e740f39f1ca2223ce77f3ba06ddf65f20942cb1e8dc9783b7f66ca87dcf6e147123d7183760087d95f78ce14ccb46410870e18f75ea2f94ed6816c8102ee7d714901dead6fd52f39097dad76dda67c8112046c790c01747f0d75d6b334657a6938844d0835d87c8c4500c280a67ed230e6067e6586e160fe1606a9f949c746c2b0cf26dd9e215ee27e1f866c18382c89eceb6c5807f9918349f690afee7094ce9a9fe4f329ffb48c18bc249f5183b8b9ae2ba9a1e6c3594f0eb85596e1999efc6b642b3f720f3c6d12593c54513ea8c6734cfd5605c0274977b662145fdb10978ed342399ecd5d518469d6d1e7c9a4759e4605139dd8af36c5a11d315c85dfa3cedcaffb3aad867aca692bad5d83eb962dd0e94da1fb323b7e3a562c5623820700ed6c24017c6699591eedea576ee273e1adbb63abcc08d6a0d79b8742ec3470947e908abb071250f1c207c470746515150eed239d9d8213b030a145311f06ec1f5046a2a29a073d7046da8a22e81a6e283d2473888d46e954528b38c4421192ba9a90e1ce76e5c568e0418db728fe791e268ca0eb9c690efb19de6c3a03b59d9b3d94547d9686e0f3355cd7163bf88646fe108bf10f67f33a4be4bdbe357782eec394a225c60e2d81d2b681b9243b9842902951469d49478c1e368baaa263352bf50be54aa8f1b325e78f2bf5b6676751c58140420b412b168823d6546ad78fcd8bcfc5891de83a95dfcbfdc555d75e1de96f54147557cc5832435e47c69d1e31eb25b29ddd05b53f87d5aa87d97de92caa587fe9d18279ba313ee60178e878fcffdbe34d225ee8bba42dcd1c1fa6267c21dce93e8a4ea993c6f60047d2984c56089df9c5bfca6992ebe11f249701103eea7ed46c2ad586a44adea781042f2cab99c0aa7400669662227757ed3852a890c381ff94b7c5bc46c571546c249a477afcc3ec861ac5727c9890bc12a694d7a207a6a065e2159466d9e8913c8095210a940656546d8bbcf3fcdc8b2c90766d895d291b9386b414242bcbf048ffe6fc57696dc782958fb767127a4eb3c73c4010984d03deec3c3ba9b6877dac8a84f1f746b8ab4ff69769d73b27855a0d2475bb772db688e26cf6e2eb66ad87645232c23918e15350d27a259486a49ce09d105b3f312b72b5267d7b91ac2585a8610ccc6ed3e73d372316d3910326afa5ee76bf020379cbec591489d8e58a52fbb364f32c2d0786b5050912bf7453943368b62d4f564ff4f7eb38a3f9183732a6ae11fd9b0e7040d2b42e9582253616738810ca570d7c668cd7076dfdb9ca4411a8e727314e4d06a708c78e4e99f1c8d139af466810617a082e85a32dedc1db1982a437e8aa594a7d2f85eb31540b7946febd6e3f178ed3ab56e00f8f35a0cd4e3320f82a4ee792795c1d0465b983194778f512e41a5963fba47ad1457ea4527964d77db4ecbaaa65cd3f71068d9da99500cbe017c2b9aab7e9c1a5cbf8e5bad19013394029537c870feec9996d1fc1b2fca4d2eb9a5f8eac985e885c102156f015c90567147bd464684c550acd91ebed0fb2c24dbf25f27e62499f077757918735bbf28ec79c87a426fee455c6aae02a49d14e6280418cee816d4b661dbc1a2141aa9142f1e42d0abd1ac079939000b09fcacc461ae851d34c7e5fd47836aefeec7510a63a5a9eb56592ab9bcac5d9ea482518f41a8cd745509c8e745ee1c4512d9fb7d461d6114471b161843d0268dc29c18ea6bd16741ff3c3d0c9e8e51fa8739a572ed98b9f3a31c90286e712e92fe6c3e48a29d39f5835a2e275ca25b7b38ef3f1e6d09064396e21136201914ae74106df246552acb00a340959a7ca2e3eb61b6fe66e27273674edce82471586213f2970626bbcda309b241a9599b61fb8af540e40a31cf50e640f70f29ad3f883403651527af35810a011f2ec786a2c60df06f98af90f1c89d84984c68cc164b5fce1232045407ef49b09da5b035e0f426d0c1a5743e3925f58a701c20aaa9cb741acd9c27e74a9438838bc7caf193871bd5c39a03d482f84ea201f52fb17dc9d65ab77241ff646f7d9ff7b81261db19d5f3b51460ba141ec5e734bf2c7f3153d175aef0e1466de0c8d25ba79cb7fb906fe276c8d270de9383e994605ffff6897c94df1649b30087631afc6cc412b3492171e0532c7208aa81fb3f17c678306f152c55c02485aa892bf014ef133dcaadd9b78ff898dafcfdc45e5656d6521112cfc244a777541c28e16746cf4331463b9523753cf49fe36264d9f99c418b30d88bdc238289a071899793544ffa6fd4d6d6acdfb4e0d156925401128808a220f3d2ccf1ecc44a3c7064b8e057dbc47a2f4d936314c73c1d78ee364a3477ad5010be73ff7a4b6c2803abde0f321f351aab2804703fe4e52e9018fed337a0e8af638348fa9f8c63fc691ce893786ba8caf0249683a4eb0a7aa6de6ce55423c06480b6e9dadd187889fc34999d969bee22466d7a8ade0e241619b174daf4e19dc2048d1ba7d777578d135b69e6dbe3caefe551cd9f42bbf39f57e18ed4b81821b057cc720122fbf9e75db34ae38405e2be424911aa9bde8599f1a5410957bf39cb8d49f1a1fac9001cfc39016af4e4274d984c753532403047c045728fb44071c445a8d46b17da2e9566bd9201553e9d0668c7cafa908b90e3076ba8ca74680e1d48e7439f250a0b9c56359497ac04ab860c5489cb58ce37bda3be41a105c933278d21e49989d095df262a2fdfa4d0d8a8db05ff5709ac1abd0e43a2ee39df5fbe4fae8d1997ee1a663892382c9bbe43aebd54f3e1a9307d2b9aedb535fb4581f42abe37c887f8f3fac4577c11958904b48b51778f4f1b529e7f87a4b6be4144ba96603b17b2c559b84e9c3d3ca5e57425deda51b6abacf94fdcb65c5f158d6093c53f083fe1421f621cf7d846e61af43b854b818761dc0f17ad45e80a100437368fb8f7018ce14b6561c400e9a50ebaca3a70c0ba736ba8939fe5ce61caf4dbb0c92d2b8c7ee541b8abda41de54c6f4bbe5b68827988ae2d81662fcaac7ce6e0c1c951c8a1e16351a0ef77f98ddb233bcf6ff763c3700060860b58cea6dfe15be56ce993042aceb609e0b0410e5370f6ebcb196218e29b4f8430023cb212f01b033b72881e1aa1da454a298f1e8a8b43695fb8d42fa6945acbb3aa4c0353dde36818a45e0a6f36ced9053ce0c10c0bfb041bd224c8fc3156be8faa1b18843da1472ff50f2dbbc4455495d97d6d6f45bf0e29ad17afc97f3ead14c6f74dc8e95d8a827d4f1420ea8626cc449d5cbbd5851b75bc2ac2bebbdc54088dc2d6aa67f75f26f265e9fda650c4c47e37fa5ff267da40942d510b0f86417d69ef5ca42d1bf5756179731cbf8bcef09cbaa4594e3c00197cc6e477185989939affaf775774c8758b7ab239172408c604681b0aa8cb1552d3fb868a4af27bf5001d757177dc105e8a17105371c0242622080cf944bae0acc03cb7173f3aba5119bb95157fb5517911dadfbbdbe1bb5d601790abf356977fdb2b90d728d250ffd6c0d5af7c6fc1dd89ab34c06059ce250d151c5e1c4ea8a0b559eaeddb010abd1f4d4d643e74dd22657ab1d24a23c9617da458160ebb51a72565a9ff6795398eb4bd0b635b3aa9e70b4686916fe2c7c0a790b33203c532c9c087e21bf3a425021fa451a4cb28210ef2449a51fe5811dbc9a72b66f5b0ac669ff757af178e493f0fda1c0eab9bcdddf21f59a69694701541243da3f67af9aa90dc3432b1ad5724c68e138a627a9ff0ad6adb167d4a18f72809515ebb1fd9709df198733a91f85756a5785e7e01b694d2ecb9ab40a10ecc039a6e511e1b831c6a315ddadcabce811c4eb75aa4515dc365882b1b22b9e86e6efef804512e00ba0b8b538de96d57eb180c94778cc51ff9488d1cf438c9c1c8f954abf8db3bdfc9414d1b3530e66516e3a3f50da9f1ab9243b984a9a3d4f1bb0e2d90be6b2a4fe6847e6d5d11de63cbae3fc7582101f6c43f33804bd9acef531dd34796a6b48a62cb2afd2aec3ba6621caaf491256bedd727cae718eadca951f2e0a06d9fdf340323bb40dbb8ace7cbe6d22b59084ce09175cda31be47c2422ac7d3961cda9c57ae5a1d8d8e533a9471c9efd1701810d76e9a4fd2eb8e879abc21339e90f7df04c2b702996f2d142a6c9fea3b9460a36dbe677ef4ed3ff56668f41056ab648525ac223f7c921922e78ab504e9b7d1390f495dd4e0d569bac5b3bb097f586b47aca8a59ff4364ac4d835e1e665f7929a39c34bdc47aa1e2335c4323174d32a227e3e4cf1767f6a4cec1e67ed613c4eb9a69e061a08cf5651c872ef0ad39c89aae6bdf0ad0b3e45e260b7693330063bc9351c1643a394ecd2bc3e33edbbaaec881d1ffc00ab91e2aacb623e372b3f67892140dfffb5d74aa50a38728f900dfce1c933102b8c229f599b8af3044eed26d01a97", @generic="aff721e55704ef83a1459e406071fcd1aa11e0ad8dfb7e0949c6780c0c17c4348cbad0440e7cfc0f0ec444addfedbb0f0c2edea894023c80511308cf290c5c217ff14ad1c4de555a979f270d6c33e2706cd2d3e6640ab5fa1068426446a2bda9e5da1b77f9ce904451676be21c0ca100fbaadc062e94f4afa7016a5183565607c8d8da3658caf6d216f52aa318ddd30ff0c9a498a01cb81855ee946fad0ae6a68090570c26c44dff42f47f7f49b3e3c7d38b3e628c5e64b519b165e03e3fa25f37ddccc950a6e97943e74769eed14f2139696b843d087b6688", @typed={0x103, 0x17, 0x0, 0x0, @binary="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"}, @typed={0x8, 0x36, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @generic="1b62a815060f03504b5ef3da0e73f6b2d7990bacd37173b2940526cac7414fa4204817c852730fb610245f1cded1de3444079c16446a50c2edb450feb3ae84be70c1bd9d5059649f4ed30b4697d4c855", @generic="15724ef1dbecf63c4e5eea1963b6c90fcd33c50e2f6a352c7ca509af66180fb297dca2fa2b42ea974db8cb098398bb06cd657c083df9afc5a10f1dc7387aebbb6d2bd99b64e38498af562f3965a66fb67faec7252b9d9e295ac7cf1bed073e9323cb951742aa82cbc03f5ae350966c53db1a71b0526fff6b3c5e1fd67e1e8f640d948086134685be8bb2e164dce6fbb284330dcda10921d7358039e788da08c3e3f53f4c6f87d13d251927354f3ee7db059041e2ee4e512f9216ecb60818efeee778936d6705641058bb4db298120e77d77523185d2bd7ed6d34b6139ec55ab1824c907b8a1d981f4a"]}]}, 0x1338}, 0x1, 0x0, 0x0, 0x200040c0}, 0x800) 20:31:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0025000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:31:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:31:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x404, 0x0, 0x2, 0x3, 0x401, 0x0, 0x3ff}, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040480ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:31:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x9000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) [ 1215.047991][T29171] usb 2-1: USB disconnect, device number 24 [ 1215.126369][ T8752] bridge0: port 2(bridge_slave_1) entered disabled state [ 1215.133645][ T8752] bridge0: port 1(bridge_slave_0) entered disabled state 20:31:18 executing program 2: ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, &(0x7f0000000040)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x78, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x34, 0x7, 0x0, 0x1, [@IPSET_ATTR_PROTO={0x5, 0x7, 0x8}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x80000000}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xffffffa8}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x11}, @IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x3}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x78}}, 0x0) [ 1215.409945][ T8753] bridge0: port 2(bridge_slave_1) entered disabled state 20:31:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="44000000020603000000000000000000000000000c000300686173683a69497000050004000000000009000200738258cea361f23e6f797a3200000000050005000200000005000100070000006355b74239dc7aba490669b5e61c86fc590935435077bd2590c61691a246f4ecb750a4d7658916a574b2b6b8b36eac011ad5b03c0de62cbd9acc23f929512364b62fb37636f7b4b32e5281231388a158a5153c208ec6a76d4b34cd5cdd649bb7b028d604c4c31c8c20f1ea961d18ef3ef8a8db48"], 0x44}}, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x64, 0x3, 0x7, 0x3, 0x0, 0x0, {0xc}, [@NFACCT_FLAGS={0x8}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x3bbb}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x800}, 0x1) 20:31:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$AUDIT_GET_FEATURE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3fb, 0x100, 0x70bd25, 0x25dfdbff, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x8800}, 0x804c) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) [ 1215.580881][T29171] usb 2-1: new high-speed USB device number 25 using dummy_hcd 20:31:19 executing program 2: r0 = semget(0x2, 0x1, 0x200) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000000c0)=""/178) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) [ 1215.830844][T29171] usb 2-1: Using ep0 maxpacket: 8 20:31:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="4400000068130cf5c89bed8c020603000000000000000000000000000c000300686173683a69700005000400000000000900020073797a32000000000500050002000000"], 0x44}}, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x10) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f00000002c0)={{0x6, 0x6, 0x7ff, 0xadb3, 'syz0\x00', 0x23}, 0x0, [0x2, 0xffffffffffff2ba7, 0x7, 0x5, 0xffffffffffff04a8, 0xfff, 0x1, 0x10, 0xffffffffa5979e28, 0x8, 0xfd, 0x9, 0x2, 0x3ff, 0x1, 0x5, 0x4, 0xc0000000, 0x7, 0x6, 0xfffe000000000000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x81, 0x6, 0x7f, 0x50, 0x3, 0x2, 0x0, 0x6, 0x0, 0x1, 0xfffffffffffff001, 0x100000001, 0x4, 0x401, 0x1, 0x8, 0x89c, 0xeb, 0x100000001, 0x5, 0x5, 0x6, 0xfffffffffffffffc, 0x8, 0x5, 0x3, 0x1, 0x4, 0x440000000, 0xdd6, 0x4, 0xfffffffffffffffc, 0xa2e, 0x8cc, 0xf16, 0x200, 0x2, 0x7fffffff, 0x3ff, 0x4, 0x80, 0x7, 0x8, 0x6159, 0xffffffff80000000, 0xc405, 0x9, 0x6, 0x100000000, 0x9, 0x400000, 0x8, 0xfffffffffffffff8, 0x2ef, 0x2, 0x0, 0x0, 0x2, 0x0, 0x7, 0x10001, 0x7, 0x1, 0x6, 0x7, 0x652, 0x1ff, 0x100, 0x4, 0x4f, 0x8, 0x10001, 0x2, 0x4, 0x800, 0x100000000, 0x7, 0x5, 0x31, 0x7, 0x9, 0xea, 0x5, 0xc2, 0x20, 0x1, 0x9, 0x10001, 0x5, 0x7, 0x7fffffff800, 0x5, 0x3, 0x1, 0x8, 0xfffffffffffffff9, 0x73c, 0xfff, 0xcf, 0x81, 0xffffffffffff49f3, 0x3ff]}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000180)={0x4, 0x2, 0x4, 0x20, 0x0, {0x77359400}, {0x5, 0xc, 0x20, 0x80, 0x8, 0xe, "d8f9bd47"}, 0x7f, 0x1, @offset=0x6, 0x2}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x38, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x400, @loopback, 0x2}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f0000000280)=0x10) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000000c0)={[], 0x3f, 0x4, 0xd5, 0x8, 0x2}) [ 1215.961556][T29171] usb 2-1: config index 0 descriptor too short (expected 248, got 54) [ 1215.969801][T29171] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xC has invalid wMaxPacketSize 0 [ 1216.001131][T29171] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1216.018378][T29171] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8 has invalid wMaxPacketSize 0 [ 1216.034895][T29171] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x4 has an invalid bInterval 102, changing to 10 [ 1216.053113][T29171] usb 2-1: New USB device found, idVendor=8086, idProduct=0181, bcdDevice=91.60 [ 1216.070131][T29171] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1216.086731][T29171] usb 2-1: config 0 descriptor?? [ 1216.106922][ T8758] bridge0: port 2(bridge_slave_1) entered disabled state [ 1216.114151][ T8758] bridge0: port 1(bridge_slave_0) entered disabled state 20:31:19 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x53, &(0x7f00000000c0)={0x8, 0x7, 0x0, 'syz1\x00'}, &(0x7f0000000100)=0x2c) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) [ 1216.142655][ T8763] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1216.182936][T29171] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1216.201452][T29171] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1216.209529][T29171] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1216.238692][T29171] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1216.262731][T29171] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1216.291753][T29171] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1216.318424][T29171] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1216.336875][T29171] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1216.352367][T29171] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1216.372392][T29171] i2400m_usb 2-1:0.0: W: __i2400mu_send_barker: cannot send URB: -8 [ 1216.409139][T29171] i2400m_usb 2-1:0.0: E: __i2400mu_send_barker: maximum errors in URB exceeded; resetting device [ 1216.443318][T29171] i2400m_usb 2-1:0.0: warm reset failed (-8); trying USB reset [ 1216.468353][T29171] ------------[ cut here ]------------ [ 1216.486904][T29171] usb 2-1: BOGUS urb xfer, pipe 1 != type 3 [ 1216.507244][T29171] WARNING: CPU: 0 PID: 29171 at drivers/usb/core/urb.c:493 usb_submit_urb+0xcde/0x14e0 [ 1216.530941][ T8759] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1216.555390][ T8759] bridge0: port 2(bridge_slave_1) entered blocking state [ 1216.562578][ T8759] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1216.583715][T29171] Modules linked in: [ 1216.599182][T29171] CPU: 0 PID: 29171 Comm: kworker/0:7 Not tainted 5.10.0-rc3-syzkaller #0 [ 1216.634905][T29171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1216.654955][ T8760] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1216.675124][ T8760] bridge0: port 2(bridge_slave_1) entered blocking state [ 1216.682401][ T8760] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1216.689846][ T8760] bridge0: port 1(bridge_slave_0) entered blocking state [ 1216.696988][ T8760] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1216.713219][T29171] Workqueue: usb_hub_wq hub_event [ 1216.730161][T29171] RIP: 0010:usb_submit_urb+0xcde/0x14e0 [ 1216.750096][T29171] Code: 84 d4 02 00 00 e8 92 71 3c fc 4c 89 ef e8 6a 3e 0d ff 41 89 d8 44 89 e1 4c 89 f2 48 89 c6 48 c7 c7 00 46 e1 89 e8 0c fb 77 03 <0f> 0b e9 ca f8 ff ff e8 66 71 3c fc 48 81 c5 48 06 00 00 e9 f6 f7 [ 1216.796358][T29171] RSP: 0018:ffffc90002e9eb90 EFLAGS: 00010282 [ 1216.811179][T29171] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 1216.839997][ T8762] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1216.849660][T29171] RDX: 0000000000040000 RSI: ffffffff8158e0c5 RDI: fffff520005d3d64 [ 1216.872845][T29171] RBP: ffff8880137ad450 R08: 0000000000000001 R09: ffff8880b9e309e7 [ 1216.883164][ T8762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1216.883390][T29171] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 1216.890256][ T8762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1216.890432][ T8762] bridge0: port 1(bridge_slave_0) entered blocking state [ 1216.899053][T29171] R13: ffff8880692850a0 R14: ffff888020dde5f0 R15: ffffc90002e9ed10 [ 1216.905618][ T8762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1216.913190][T29171] FS: 0000000000000000(0000) GS:ffff8880b9e00000(0000) knlGS:0000000000000000 [ 1216.954656][T29171] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1216.965899][T29171] CR2: 00007f08dc048168 CR3: 0000000027387000 CR4: 00000000001526f0 [ 1216.981623][T29171] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1216.992846][T29171] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1217.003287][T29171] Call Trace: [ 1217.006774][T29171] ? lockdep_init_map_waits+0x232/0x720 [ 1217.014393][T29171] i2400mu_bus_bm_wait_for_ack+0x4b5/0xb50 [ 1217.020415][T29171] ? i2400mu_bus_bm_cmd_send+0xba0/0xba0 [ 1217.027014][T29171] ? dev_printk_emit+0xba/0xf1 [ 1217.032322][T29171] ? dev_vprintk_emit+0x32e/0x32e [ 1217.045379][T29171] ? i2400m_debugfs_rm+0x40/0x40 [ 1217.056104][T29171] ? __dev_printk+0xcf/0xf5 [ 1217.065045][T29171] ? mark_held_locks+0x9f/0xe0 [ 1217.071879][T29171] ? queue_work_on+0xab/0xd0 [ 1217.076638][T29171] ? lockdep_hardirqs_on+0x79/0x100 [ 1217.082384][T29171] i2400m_bm_cmd+0x346/0x7f0 [ 1217.088467][T29171] ? i2400mu_bus_reset+0x25d/0x410 [ 1217.094462][T29171] ? __i2400m_bm_ack_verify+0x950/0x950 [ 1217.100159][T29171] ? usb_probe_device+0xd9/0x2c0 [ 1217.108403][T29171] ? really_probe+0x291/0xde0 [ 1217.115222][T29171] ? driver_probe_device+0x26b/0x3d0 [ 1217.121135][T29171] ? __device_attach_driver+0x1d1/0x290 [ 1217.126834][T29171] ? bus_for_each_drv+0x15f/0x1e0 [ 1217.132370][T29171] ? __device_attach+0x228/0x4a0 [ 1217.138590][T29171] ? bus_probe_device+0x1e4/0x290 [ 1217.148133][T29171] ? device_add+0xbb2/0x1ce0 [ 1217.155174][T29171] ? usb_new_device.cold+0x71d/0xfe9 [ 1217.167049][T29171] ? hub_event+0x2348/0x42d0 [ 1217.176421][T29171] ? process_one_work+0x933/0x15a0 [ 1217.189481][T29171] ? i2400m_reset+0x7e/0x2d0 [ 1217.201211][T29171] ? ret_from_fork+0x1f/0x30 [ 1217.212716][T29171] i2400m_bootrom_init+0x2c0/0xdc0 [ 1217.232402][T29171] ? i2400m_barker_db_init+0x2d0/0x2d0 [ 1217.238088][T29171] ? kasan_unpoison_shadow+0x33/0x40 [ 1217.252855][T29171] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1217.258710][T29171] i2400m_setup+0x29c/0x970 [ 1217.276738][T29171] ? i2400m_error_recovery+0xc0/0xc0 [ 1217.288016][T29171] ? mark_held_locks+0x9f/0xe0 [ 1217.293837][T29171] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1217.299080][T29171] i2400mu_probe+0x6b9/0xb10 [ 1217.306078][T29171] usb_probe_interface+0x315/0x7f0 [ 1217.311635][T29171] ? usb_match_dynamic_id+0x1a0/0x1a0 [ 1217.317030][T29171] really_probe+0x291/0xde0 [ 1217.322405][T29171] driver_probe_device+0x26b/0x3d0 [ 1217.328165][T29171] __device_attach_driver+0x1d1/0x290 [ 1217.334034][T29171] ? driver_allows_async_probing+0x150/0x150 [ 1217.341381][T29171] bus_for_each_drv+0x15f/0x1e0 [ 1217.346699][T29171] ? bus_for_each_dev+0x1d0/0x1d0 [ 1217.352203][T29171] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 1217.359326][T29171] ? lockdep_hardirqs_on+0x79/0x100 [ 1217.366714][T29171] ? _raw_spin_unlock_irqrestore+0x2f/0x50 [ 1217.372982][T29171] __device_attach+0x228/0x4a0 [ 1217.377766][T29171] ? really_probe+0xde0/0xde0 [ 1217.384283][T29171] ? kobject_uevent_env+0x2bb/0x1680 [ 1217.390332][T29171] bus_probe_device+0x1e4/0x290 [ 1217.396253][T29171] device_add+0xbb2/0x1ce0 [ 1217.401059][T29171] ? devlink_add_symlinks+0x450/0x450 [ 1217.406662][T29171] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 1217.412936][T29171] usb_set_configuration+0x113c/0x1910 [ 1217.419122][T29171] usb_generic_driver_probe+0xba/0x100 [ 1217.425175][T29171] usb_probe_device+0xd9/0x2c0 [ 1217.431566][T29171] ? usb_driver_release_interface+0x180/0x180 [ 1217.439151][T29171] really_probe+0x291/0xde0 [ 1217.445063][T29171] driver_probe_device+0x26b/0x3d0 [ 1217.451515][T29171] __device_attach_driver+0x1d1/0x290 [ 1217.456913][T29171] ? driver_allows_async_probing+0x150/0x150 [ 1217.463311][T29171] bus_for_each_drv+0x15f/0x1e0 [ 1217.469304][T29171] ? bus_for_each_dev+0x1d0/0x1d0 [ 1217.474766][T29171] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 1217.482097][T29171] ? lockdep_hardirqs_on+0x79/0x100 [ 1217.488789][T29171] ? _raw_spin_unlock_irqrestore+0x2f/0x50 [ 1217.495233][T29171] __device_attach+0x228/0x4a0 [ 1217.503226][T29171] ? really_probe+0xde0/0xde0 [ 1217.509300][T29171] ? kobject_uevent_env+0x2bb/0x1680 [ 1217.524890][T29171] bus_probe_device+0x1e4/0x290 [ 1217.532792][T29171] device_add+0xbb2/0x1ce0 [ 1217.537397][T29171] ? devlink_add_symlinks+0x450/0x450 [ 1217.554442][T29171] usb_new_device.cold+0x71d/0xfe9 [ 1217.568468][T29171] ? hub_disconnect+0x510/0x510 [ 1217.580673][T29171] ? rwlock_bug.part.0+0x90/0x90 [ 1217.594892][T29171] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1217.603398][T29171] hub_event+0x2348/0x42d0 [ 1217.609004][T29171] ? hub_port_debounce+0x3b0/0x3b0 [ 1217.615818][T29171] ? lock_release+0x710/0x710 [ 1217.621971][T29171] ? lock_downgrade+0x6d0/0x6d0 [ 1217.628253][T29171] process_one_work+0x933/0x15a0 [ 1217.635156][T29171] ? lock_release+0x710/0x710 [ 1217.641506][T29171] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1217.646991][T29171] ? rwlock_bug.part.0+0x90/0x90 [ 1217.652640][T29171] ? _raw_spin_lock_irq+0x41/0x50 [ 1217.658869][T29171] worker_thread+0x64c/0x1120 [ 1217.664219][T29171] ? __kthread_parkme+0x13f/0x1e0 [ 1217.669501][T29171] ? process_one_work+0x15a0/0x15a0 [ 1217.675274][T29171] kthread+0x3af/0x4a0 [ 1217.681455][T29171] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 1217.687819][T29171] ret_from_fork+0x1f/0x30 [ 1217.694459][T29171] Kernel panic - not syncing: panic_on_warn set ... [ 1217.701258][T29171] CPU: 0 PID: 29171 Comm: kworker/0:7 Not tainted 5.10.0-rc3-syzkaller #0 [ 1217.710617][T29171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.721578][T29171] Workqueue: usb_hub_wq hub_event [ 1217.728063][T29171] Call Trace: [ 1217.732132][T29171] dump_stack+0x107/0x163 [ 1217.736697][T29171] panic+0x306/0x73d [ 1217.741476][T29171] ? __warn_printk+0xf3/0xf3 [ 1217.746208][T29171] ? __warn.cold+0x1d/0xbb [ 1217.750645][T29171] ? usb_submit_urb+0xcde/0x14e0 [ 1217.756968][T29171] __warn.cold+0x38/0xbb [ 1217.761269][T29171] ? usb_submit_urb+0xcde/0x14e0 [ 1217.766291][T29171] report_bug+0x1bd/0x210 [ 1217.772165][T29171] handle_bug+0x3c/0x60 [ 1217.776332][T29171] exc_invalid_op+0x14/0x40 [ 1217.781155][T29171] asm_exc_invalid_op+0x12/0x20 [ 1217.786020][T29171] RIP: 0010:usb_submit_urb+0xcde/0x14e0 [ 1217.792075][T29171] Code: 84 d4 02 00 00 e8 92 71 3c fc 4c 89 ef e8 6a 3e 0d ff 41 89 d8 44 89 e1 4c 89 f2 48 89 c6 48 c7 c7 00 46 e1 89 e8 0c fb 77 03 <0f> 0b e9 ca f8 ff ff e8 66 71 3c fc 48 81 c5 48 06 00 00 e9 f6 f7 [ 1217.811878][T29171] RSP: 0018:ffffc90002e9eb90 EFLAGS: 00010282 [ 1217.817972][T29171] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 1217.826930][T29171] RDX: 0000000000040000 RSI: ffffffff8158e0c5 RDI: fffff520005d3d64 [ 1217.834925][T29171] RBP: ffff8880137ad450 R08: 0000000000000001 R09: ffff8880b9e309e7 [ 1217.842914][T29171] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 1217.851345][T29171] R13: ffff8880692850a0 R14: ffff888020dde5f0 R15: ffffc90002e9ed10 [ 1217.860305][T29171] ? vprintk_func+0x95/0x1e0 [ 1217.865209][T29171] ? lockdep_init_map_waits+0x232/0x720 [ 1217.871319][T29171] i2400mu_bus_bm_wait_for_ack+0x4b5/0xb50 [ 1217.878312][T29171] ? i2400mu_bus_bm_cmd_send+0xba0/0xba0 [ 1217.883998][T29171] ? dev_printk_emit+0xba/0xf1 [ 1217.889486][T29171] ? dev_vprintk_emit+0x32e/0x32e [ 1217.894553][T29171] ? i2400m_debugfs_rm+0x40/0x40 [ 1217.900604][T29171] ? __dev_printk+0xcf/0xf5 [ 1217.905127][T29171] ? mark_held_locks+0x9f/0xe0 [ 1217.910554][T29171] ? queue_work_on+0xab/0xd0 [ 1217.915162][T29171] ? lockdep_hardirqs_on+0x79/0x100 [ 1217.920394][T29171] i2400m_bm_cmd+0x346/0x7f0 [ 1217.927435][T29171] ? i2400mu_bus_reset+0x25d/0x410 [ 1217.932575][T29171] ? __i2400m_bm_ack_verify+0x950/0x950 [ 1217.939079][T29171] ? usb_probe_device+0xd9/0x2c0 [ 1217.944035][T29171] ? really_probe+0x291/0xde0 [ 1217.949886][T29171] ? driver_probe_device+0x26b/0x3d0 [ 1217.955188][T29171] ? __device_attach_driver+0x1d1/0x290 [ 1217.961176][T29171] ? bus_for_each_drv+0x15f/0x1e0 [ 1217.967156][T29171] ? __device_attach+0x228/0x4a0 [ 1217.972106][T29171] ? bus_probe_device+0x1e4/0x290 [ 1217.978009][T29171] ? device_add+0xbb2/0x1ce0 [ 1217.982611][T29171] ? usb_new_device.cold+0x71d/0xfe9 [ 1217.988787][T29171] ? hub_event+0x2348/0x42d0 [ 1217.993387][T29171] ? process_one_work+0x933/0x15a0 [ 1217.999835][T29171] ? i2400m_reset+0x7e/0x2d0 [ 1218.004437][T29171] ? ret_from_fork+0x1f/0x30 [ 1218.009048][T29171] i2400m_bootrom_init+0x2c0/0xdc0 [ 1218.014181][T29171] ? i2400m_barker_db_init+0x2d0/0x2d0 [ 1218.020997][T29171] ? kasan_unpoison_shadow+0x33/0x40 [ 1218.027447][T29171] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1218.033277][T29171] i2400m_setup+0x29c/0x970 [ 1218.037793][T29171] ? i2400m_error_recovery+0xc0/0xc0 [ 1218.043101][T29171] ? mark_held_locks+0x9f/0xe0 [ 1218.047882][T29171] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1218.053099][T29171] i2400mu_probe+0x6b9/0xb10 [ 1218.057709][T29171] usb_probe_interface+0x315/0x7f0 [ 1218.062849][T29171] ? usb_match_dynamic_id+0x1a0/0x1a0 [ 1218.069241][T29171] really_probe+0x291/0xde0 [ 1218.073768][T29171] driver_probe_device+0x26b/0x3d0 [ 1218.080062][T29171] __device_attach_driver+0x1d1/0x290 [ 1218.086566][T29171] ? driver_allows_async_probing+0x150/0x150 [ 1218.092582][T29171] bus_for_each_drv+0x15f/0x1e0 [ 1218.097986][T29171] ? bus_for_each_dev+0x1d0/0x1d0 [ 1218.103024][T29171] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 1218.108951][T29171] ? lockdep_hardirqs_on+0x79/0x100 [ 1218.114164][T29171] ? _raw_spin_unlock_irqrestore+0x2f/0x50 [ 1218.120983][T29171] __device_attach+0x228/0x4a0 [ 1218.126490][T29171] ? really_probe+0xde0/0xde0 [ 1218.131180][T29171] ? kobject_uevent_env+0x2bb/0x1680 [ 1218.137344][T29171] bus_probe_device+0x1e4/0x290 [ 1218.142222][T29171] device_add+0xbb2/0x1ce0 [ 1218.147438][T29171] ? devlink_add_symlinks+0x450/0x450 [ 1218.152824][T29171] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 1218.158655][T29171] usb_set_configuration+0x113c/0x1910 [ 1218.164924][T29171] usb_generic_driver_probe+0xba/0x100 [ 1218.170402][T29171] usb_probe_device+0xd9/0x2c0 [ 1218.175177][T29171] ? usb_driver_release_interface+0x180/0x180 [ 1218.181259][T29171] really_probe+0x291/0xde0 [ 1218.187177][T29171] driver_probe_device+0x26b/0x3d0 [ 1218.192313][T29171] __device_attach_driver+0x1d1/0x290 [ 1218.197700][T29171] ? driver_allows_async_probing+0x150/0x150 [ 1218.203687][T29171] bus_for_each_drv+0x15f/0x1e0 [ 1218.208550][T29171] ? bus_for_each_dev+0x1d0/0x1d0 [ 1218.213592][T29171] ? _raw_spin_unlock_irqrestore+0x42/0x50 [ 1218.219413][T29171] ? lockdep_hardirqs_on+0x79/0x100 [ 1218.224626][T29171] ? _raw_spin_unlock_irqrestore+0x2f/0x50 [ 1218.230451][T29171] __device_attach+0x228/0x4a0 [ 1218.235237][T29171] ? really_probe+0xde0/0xde0 [ 1218.239929][T29171] ? kobject_uevent_env+0x2bb/0x1680 [ 1218.245238][T29171] bus_probe_device+0x1e4/0x290 [ 1218.250107][T29171] device_add+0xbb2/0x1ce0 [ 1218.254542][T29171] ? devlink_add_symlinks+0x450/0x450 [ 1218.260582][T29171] usb_new_device.cold+0x71d/0xfe9 [ 1218.265716][T29171] ? hub_disconnect+0x510/0x510 [ 1218.270577][T29171] ? rwlock_bug.part.0+0x90/0x90 [ 1218.275533][T29171] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1218.280748][T29171] hub_event+0x2348/0x42d0 20:31:21 executing program 1: syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000f0d31d08868081016091000000010902f800010000000009040000047eb17d0009050c000000000000090582030004000000090508000000000000090504"], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="440000000206030000000000000000000000c625b3ea865700000c000300686173683a69700005000400000000000900020073797a320010000005000500020000000500acbd75d58b08c3ea287d0f45b70ad3dd56a38067d230c2cbc094ecb98c38f968483fd4b9afef436a6f6d424df0f10aa30e64151c46d4664ab18dd134ec7672201affd289b945aed9fbf16f814b0a771a0b19ee17f885d1a2ec458832c6944385738b4a7a7c11883d8d0fba7396eb61262f5f04fa801248f0de67816cd78c7c6aa2dd1d760d3c9f35ec6c76a87a948386ada85384ce5d784b62935cdaea7113e2064f0fb26d3900000000000000"], 0x44}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x3, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x4, 0x0) fsmount(r0, 0x0, 0x2) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x2c, &(0x7f0000000140)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x35}}, @in6={0xa, 0x4e21, 0x1, @mcast1, 0x9}]}, &(0x7f00000002c0)=0x10) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000380)=""/131) 20:31:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x44, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="dc000000", @ANYRES16=r3, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r5, @ANYBLOB="08009e00000d000080008480080002000900000008000200000000000a0005004b82012c996200000a000500ffffffffffff0000340006800800000000000000080001000600000008000200000000000800020000000000080001000001000008000200910000000a000500b074a652944700000a0001000202020202020000080902000300000038007d"], 0xdc}}, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000340)=0x0) syz_open_procfs(r6, &(0x7f0000000380)='fd\x00') sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r3, 0x100, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x625, 0x53}}}}, ["", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x20004000}, 0x44c05) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x24, 0x26, 0x829, 0x0, 0x0, {0x4, 0x1000000}, [@typed={0x8, 0xc, 0x0, 0x0, @uid}, @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@local}, @generic]}, 0x24}, 0x1, 0xffffff7f0e000000}, 0x84) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="dc000000", @ANYRES16=r9, @ANYBLOB="010000000000000000002100000008000300", @ANYRES32=r11, @ANYBLOB="08009e00000d000080008480080002000900000008000200000000000a0005004b82012c996200000a000500ffffffffffff0000340006800800000000000000080001000600000008000200000000000800020000000000080001000001000008000200910000000a000500b074a652944700000a0001000202020202020000080902000300000038007d"], 0xdc}}, 0x0) sendmsg$NL80211_CMD_GET_KEY(r7, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x80, r3, 0x10, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0x1ff, 0x12}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x4}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x3}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "033918c3f4"}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x3}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x14, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x80}, 0x1, 0x0, 0x0, 0x8005}, 0x4000001) 20:31:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d00000003101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) 20:31:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e004e000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x89, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280)=r1, 0x4) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x8, 0x0, 0x8, 0x8, 0x0, 0x1, 0x80224, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040)}, 0x8020, 0x8001, 0x9, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x9, 0x5, 0x0, 0x4, 0x0, 0x6, 0x920, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x5}, 0x404, 0x6, 0x2, 0x3, 0x401, 0x4, 0x3ff}, r2, 0x3, r3, 0xb) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1218.285220][T29171] ? hub_port_debounce+0x3b0/0x3b0 [ 1218.290358][T29171] ? lock_release+0x710/0x710 [ 1218.295054][T29171] ? lock_downgrade+0x6d0/0x6d0 [ 1218.299937][T29171] process_one_work+0x933/0x15a0 [ 1218.304904][T29171] ? lock_release+0x710/0x710 [ 1218.309595][T29171] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1218.314990][T29171] ? rwlock_bug.part.0+0x90/0x90 [ 1218.319944][T29171] ? _raw_spin_lock_irq+0x41/0x50 [ 1218.324992][T29171] worker_thread+0x64c/0x1120 [ 1218.329702][T29171] ? __kthread_parkme+0x13f/0x1e0 [ 1218.334750][T29171] ? process_one_work+0x15a0/0x15a0 [ 1218.339965][T29171] kthread+0x3af/0x4a0 [ 1218.344051][T29171] ? kthread_create_worker_on_cpu+0xf0/0xf0 [ 1218.349963][T29171] ret_from_fork+0x1f/0x30 [ 1218.356278][T29171] Kernel Offset: disabled [ 1218.360756][T29171] Rebooting in 86400 seconds..