0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:46 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 356.013555][T13267] RBP: 00007f884fd5c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 356.021555][T13267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 356.029529][T13267] R13: 00007ffda713e28f R14: 00007f884fd5c300 R15: 0000000000022000 [ 356.037525][T13267] [ 356.048571][T13269] loop3: detected capacity change from 0 to 128 [ 356.097960][T13274] FAULT_INJECTION: forcing a failure. [ 356.097960][T13274] name failslab, interval 1, probability 0, space 0, times 0 [ 356.110639][T13274] CPU: 1 PID: 13274 Comm: syz-executor.1 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 356.120735][T13274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 356.130801][T13274] Call Trace: [ 356.134085][T13274] [ 356.137081][T13274] dump_stack_lvl+0xda/0x130 [ 356.141684][T13274] dump_stack+0x15/0x20 [ 356.145857][T13274] should_fail_ex+0x21f/0x230 [ 356.150589][T13274] __should_failslab+0x92/0xa0 [ 356.155404][T13274] should_failslab+0x9/0x20 [ 356.160001][T13274] slab_pre_alloc_hook+0x38/0x180 [ 356.165111][T13274] kmem_cache_alloc_node+0x54/0x240 [ 356.170335][T13274] ? __alloc_skb+0x109/0x2e0 [ 356.174940][T13274] __alloc_skb+0x109/0x2e0 [ 356.179391][T13274] netlink_sendmsg+0x483/0x770 [ 356.184218][T13274] ? netlink_getsockopt+0x3e0/0x3e0 [ 356.189445][T13274] ____sys_sendmsg+0x37c/0x4d0 [ 356.194249][T13274] __sys_sendmsg+0x1e9/0x270 [ 356.198919][T13274] __x64_sys_sendmsg+0x46/0x50 [ 356.203700][T13274] do_syscall_64+0x41/0xc0 [ 356.208134][T13274] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 356.214103][T13274] RIP: 0033:0x7fa733391389 [ 356.218595][T13274] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 356.238239][T13274] RSP: 002b:00007fa732704168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:18:46 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) (fail_nth: 4) [ 356.246667][T13274] RAX: ffffffffffffffda RBX: 00007fa7334b0f80 RCX: 00007fa733391389 [ 356.254644][T13274] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000003 [ 356.262684][T13274] RBP: 00007fa7327041d0 R08: 0000000000000000 R09: 0000000000000000 [ 356.270729][T13274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 356.278704][T13274] R13: 00007ffd52bc863f R14: 00007fa732704300 R15: 0000000000022000 [ 356.286720][T13274] [ 356.305393][T13281] FAULT_INJECTION: forcing a failure. [ 356.305393][T13281] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 356.318596][T13281] CPU: 0 PID: 13281 Comm: syz-executor.5 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 356.328825][T13281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 356.338904][T13281] Call Trace: [ 356.342191][T13281] [ 356.345141][T13281] dump_stack_lvl+0xda/0x130 [ 356.349770][T13281] dump_stack+0x15/0x20 [ 356.353930][T13281] should_fail_ex+0x21f/0x230 [ 356.358620][T13281] should_fail+0xb/0x10 [ 356.362779][T13281] should_fail_usercopy+0x1a/0x20 [ 356.367817][T13281] _copy_from_iter+0xd8/0xa40 [ 356.372577][T13281] ? kmalloc_reserve+0xfb/0x190 [ 356.377551][T13281] ? __build_skb_around+0x196/0x1f0 [ 356.382761][T13281] ? __virt_addr_valid+0x16a/0x1b0 [ 356.387978][T13281] ? __check_object_size+0x363/0x520 [ 356.393358][T13281] netlink_sendmsg+0x53c/0x770 [ 356.398139][T13281] ? netlink_getsockopt+0x3e0/0x3e0 [ 356.403350][T13281] ____sys_sendmsg+0x37c/0x4d0 [ 356.408224][T13281] __sys_sendmsg+0x1e9/0x270 [ 356.412857][T13281] __x64_sys_sendmsg+0x46/0x50 [ 356.417652][T13281] do_syscall_64+0x41/0xc0 [ 356.422077][T13281] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 356.427987][T13281] RIP: 0033:0x7f8850a0a389 [ 356.432570][T13281] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 356.452244][T13281] RSP: 002b:00007f884fd7d168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 356.460699][T13281] RAX: ffffffffffffffda RBX: 00007f8850b29f80 RCX: 00007f8850a0a389 [ 356.468693][T13281] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000004 [ 356.476723][T13281] RBP: 00007f884fd7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 356.484700][T13281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 356.492675][T13281] R13: 00007ffda713e28f R14: 00007f884fd7d300 R15: 0000000000022000 [ 356.500664][T13281] 07:18:46 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x20200, 0x0, 0x0, 0x0) 07:18:46 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) (fail_nth: 3) 07:18:46 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) (fail_nth: 5) 07:18:46 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:46 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x2c000000, 0x0, 0x0, 0x0) [ 356.718088][T13291] FAULT_INJECTION: forcing a failure. [ 356.718088][T13291] name failslab, interval 1, probability 0, space 0, times 0 [ 356.730872][T13291] CPU: 1 PID: 13291 Comm: syz-executor.5 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 356.740977][T13291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 356.751061][T13291] Call Trace: [ 356.754342][T13291] [ 356.757296][T13291] dump_stack_lvl+0xda/0x130 [ 356.761899][T13291] dump_stack+0x15/0x20 [ 356.766113][T13291] should_fail_ex+0x21f/0x230 [ 356.770843][T13291] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 356.777176][T13291] __should_failslab+0x92/0xa0 [ 356.781981][T13291] should_failslab+0x9/0x20 [ 356.786546][T13291] slab_pre_alloc_hook+0x38/0x180 [ 356.791663][T13291] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 356.797959][T13291] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 356.804221][T13291] __kmem_cache_alloc_node+0x48/0x1d0 [ 356.809612][T13291] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 356.816011][T13291] __kmalloc+0x95/0x1a0 [ 356.820258][T13291] genl_family_rcv_msg_attrs_parse+0x75/0x1a0 [ 356.826385][T13291] ? ns_capable+0x7c/0xb0 [ 356.830836][T13291] genl_rcv_msg+0x4b3/0x720 [ 356.835355][T13291] ? nl802154_exit+0x20/0x20 [ 356.840020][T13291] ? nl802154_dump_llsec_key+0x6e0/0x6e0 [ 356.845721][T13291] ? nl802154_pre_doit+0x6a0/0x6a0 [ 356.850855][T13291] ? __rcu_read_unlock+0x4d/0x70 [ 356.855853][T13291] ? avc_has_perm_noaudit+0x1c8/0x210 [ 356.861241][T13291] netlink_rcv_skb+0x126/0x220 [ 356.866051][T13291] ? genl_bind+0x1b0/0x1b0 [ 356.870487][T13291] genl_rcv+0x28/0x40 [ 356.874571][T13291] netlink_unicast+0x56f/0x640 [ 356.879436][T13291] netlink_sendmsg+0x665/0x770 [ 356.884287][T13291] ? netlink_getsockopt+0x3e0/0x3e0 [ 356.889502][T13291] ____sys_sendmsg+0x37c/0x4d0 [ 356.894303][T13291] __sys_sendmsg+0x1e9/0x270 [ 356.898977][T13291] __x64_sys_sendmsg+0x46/0x50 [ 356.903780][T13291] do_syscall_64+0x41/0xc0 [ 356.908207][T13291] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 356.914167][T13291] RIP: 0033:0x7f8850a0a389 [ 356.918585][T13291] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 356.938271][T13291] RSP: 002b:00007f884fd7d168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 356.946736][T13291] RAX: ffffffffffffffda RBX: 00007f8850b29f80 RCX: 00007f8850a0a389 [ 356.954713][T13291] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000004 07:18:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) (fail_nth: 4) [ 356.962750][T13291] RBP: 00007f884fd7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 356.970801][T13291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 356.978781][T13291] R13: 00007ffda713e28f R14: 00007f884fd7d300 R15: 0000000000022000 [ 356.986798][T13291] [ 356.996910][T13296] loop0: detected capacity change from 0 to 128 [ 357.014354][T13297] loop3: detected capacity change from 0 to 128 [ 357.032906][T13299] FAULT_INJECTION: forcing a failure. [ 357.032906][T13299] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 357.046055][T13299] CPU: 1 PID: 13299 Comm: syz-executor.1 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 357.056229][T13299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 357.066470][T13299] Call Trace: [ 357.069805][T13299] [ 357.072802][T13299] dump_stack_lvl+0xda/0x130 [ 357.077434][T13299] dump_stack+0x15/0x20 [ 357.081602][T13299] should_fail_ex+0x21f/0x230 [ 357.086313][T13299] should_fail+0xb/0x10 [ 357.090479][T13299] should_fail_usercopy+0x1a/0x20 [ 357.095588][T13299] _copy_from_iter+0xd8/0xa40 [ 357.100278][T13299] ? kmalloc_reserve+0xfb/0x190 [ 357.105232][T13299] ? __build_skb_around+0x196/0x1f0 [ 357.110478][T13299] ? __virt_addr_valid+0x16a/0x1b0 [ 357.115744][T13299] ? __check_object_size+0x363/0x520 [ 357.121103][T13299] netlink_sendmsg+0x53c/0x770 [ 357.125887][T13299] ? netlink_getsockopt+0x3e0/0x3e0 [ 357.131163][T13299] ____sys_sendmsg+0x37c/0x4d0 [ 357.136014][T13299] __sys_sendmsg+0x1e9/0x270 [ 357.140661][T13299] __x64_sys_sendmsg+0x46/0x50 [ 357.145505][T13299] do_syscall_64+0x41/0xc0 [ 357.149934][T13299] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 357.155846][T13299] RIP: 0033:0x7fa733391389 [ 357.160277][T13299] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 357.179928][T13299] RSP: 002b:00007fa732704168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 357.188367][T13299] RAX: ffffffffffffffda RBX: 00007fa7334b0f80 RCX: 00007fa733391389 [ 357.196343][T13299] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000003 [ 357.204320][T13299] RBP: 00007fa7327041d0 R08: 0000000000000000 R09: 0000000000000000 [ 357.212375][T13299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 07:18:47 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) (fail_nth: 6) 07:18:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) (fail_nth: 5) [ 357.220348][T13299] R13: 00007ffd52bc863f R14: 00007fa732704300 R15: 0000000000022000 [ 357.228323][T13299] 07:18:47 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 357.289848][T13306] FAULT_INJECTION: forcing a failure. [ 357.289848][T13306] name failslab, interval 1, probability 0, space 0, times 0 [ 357.302621][T13306] CPU: 0 PID: 13306 Comm: syz-executor.1 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 357.312740][T13306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 357.322860][T13306] Call Trace: [ 357.326150][T13306] [ 357.329081][T13306] dump_stack_lvl+0xda/0x130 [ 357.333690][T13306] dump_stack+0x15/0x20 [ 357.337858][T13306] should_fail_ex+0x21f/0x230 [ 357.342544][T13306] __should_failslab+0x92/0xa0 [ 357.347314][T13306] should_failslab+0x9/0x20 [ 357.351831][T13306] slab_pre_alloc_hook+0x38/0x180 [ 357.356922][T13306] kmem_cache_alloc_node+0x54/0x240 [ 357.362205][T13306] ? __alloc_skb+0x109/0x2e0 [ 357.366809][T13306] __alloc_skb+0x109/0x2e0 [ 357.371266][T13306] ? sysvec_apic_timer_interrupt+0x42/0x80 [ 357.377087][T13306] netlink_ack+0x23b/0x940 [ 357.381518][T13306] ? xfd_validate_state+0x46/0xf0 [ 357.386649][T13306] ? __rcu_read_unlock+0x4d/0x70 [ 357.391646][T13306] netlink_rcv_skb+0x18f/0x220 [ 357.396507][T13306] ? rtnetlink_bind+0x60/0x60 [ 357.401228][T13306] rtnetlink_rcv+0x1c/0x20 [ 357.405683][T13306] netlink_unicast+0x56f/0x640 [ 357.410584][T13306] netlink_sendmsg+0x665/0x770 [ 357.415364][T13306] ? netlink_getsockopt+0x3e0/0x3e0 [ 357.420715][T13306] ____sys_sendmsg+0x37c/0x4d0 [ 357.425572][T13306] __sys_sendmsg+0x1e9/0x270 [ 357.430317][T13306] __x64_sys_sendmsg+0x46/0x50 [ 357.435181][T13306] do_syscall_64+0x41/0xc0 [ 357.439714][T13306] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 357.445688][T13306] RIP: 0033:0x7fa733391389 [ 357.450106][T13306] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 357.469806][T13306] RSP: 002b:00007fa732704168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 357.478237][T13306] RAX: ffffffffffffffda RBX: 00007fa7334b0f80 RCX: 00007fa733391389 07:18:47 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x80000, 0x0, 0x0, 0x0) [ 357.486214][T13306] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000003 [ 357.494247][T13306] RBP: 00007fa7327041d0 R08: 0000000000000000 R09: 0000000000000000 [ 357.502223][T13306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.510277][T13306] R13: 00007ffd52bc863f R14: 00007fa732704300 R15: 0000000000022000 [ 357.518352][T13306] 07:18:47 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) [ 357.546175][T13307] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 357.570494][T13307] FAULT_INJECTION: forcing a failure. [ 357.570494][T13307] name failslab, interval 1, probability 0, space 0, times 0 [ 357.583355][T13307] CPU: 0 PID: 13307 Comm: syz-executor.5 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 357.593502][T13307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 357.603599][T13307] Call Trace: [ 357.606879][T13307] [ 357.609874][T13307] dump_stack_lvl+0xda/0x130 [ 357.614497][T13307] dump_stack+0x15/0x20 [ 357.618724][T13307] should_fail_ex+0x21f/0x230 [ 357.623474][T13307] __should_failslab+0x92/0xa0 [ 357.628244][T13307] should_failslab+0x9/0x20 [ 357.632872][T13307] slab_pre_alloc_hook+0x38/0x180 [ 357.637933][T13307] kmem_cache_alloc_node+0x54/0x240 [ 357.643229][T13307] ? __alloc_skb+0x109/0x2e0 [ 357.647835][T13307] __alloc_skb+0x109/0x2e0 [ 357.652265][T13307] netlink_ack+0x23b/0x940 [ 357.656695][T13307] ? __rcu_read_unlock+0x4d/0x70 [ 357.661677][T13307] netlink_rcv_skb+0x18f/0x220 [ 357.666488][T13307] ? genl_bind+0x1b0/0x1b0 [ 357.671054][T13307] genl_rcv+0x28/0x40 [ 357.675056][T13307] netlink_unicast+0x56f/0x640 [ 357.679934][T13307] netlink_sendmsg+0x665/0x770 [ 357.684727][T13307] ? netlink_getsockopt+0x3e0/0x3e0 [ 357.689974][T13307] ____sys_sendmsg+0x37c/0x4d0 [ 357.694756][T13307] __sys_sendmsg+0x1e9/0x270 [ 357.699491][T13307] __x64_sys_sendmsg+0x46/0x50 [ 357.704279][T13307] do_syscall_64+0x41/0xc0 [ 357.708837][T13307] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 357.714746][T13307] RIP: 0033:0x7f8850a0a389 [ 357.719165][T13307] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 357.738856][T13307] RSP: 002b:00007f884fd7d168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:18:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) (fail_nth: 6) 07:18:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) (fail_nth: 7) [ 357.747274][T13307] RAX: ffffffffffffffda RBX: 00007f8850b29f80 RCX: 00007f8850a0a389 [ 357.755247][T13307] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000004 [ 357.763223][T13307] RBP: 00007f884fd7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 357.771262][T13307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 357.779246][T13307] R13: 00007ffda713e28f R14: 00007f884fd7d300 R15: 0000000000022000 [ 357.787249][T13307] 07:18:47 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x3f000000, 0x0, 0x0, 0x0) 07:18:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) (fail_nth: 7) 07:18:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) (fail_nth: 8) [ 357.840089][T13319] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 357.869150][T13322] loop0: detected capacity change from 0 to 128 [ 357.897364][T13309] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 357.906801][T13325] FAULT_INJECTION: forcing a failure. [ 357.906801][T13325] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 357.907089][T13326] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 357.919972][T13325] CPU: 1 PID: 13325 Comm: syz-executor.1 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 357.930876][T13328] loop3: detected capacity change from 0 to 128 [ 357.939273][T13325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 357.955730][T13325] Call Trace: [ 357.959097][T13325] [ 357.962090][T13325] dump_stack_lvl+0xda/0x130 [ 357.966729][T13325] dump_stack+0x15/0x20 [ 357.970911][T13325] should_fail_ex+0x21f/0x230 [ 357.975680][T13325] should_fail+0xb/0x10 [ 357.979871][T13325] should_fail_usercopy+0x1a/0x20 [ 357.984936][T13325] _copy_to_user+0x1e/0x90 [ 357.986332][T13326] FAULT_INJECTION: forcing a failure. [ 357.986332][T13326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 357.989361][T13325] simple_read_from_buffer+0xa0/0x110 [ 358.007835][T13325] proc_fail_nth_read+0xfc/0x140 [ 358.012816][T13325] ? proc_fault_inject_write+0x210/0x210 [ 358.018499][T13325] vfs_read+0x19f/0x5c0 [ 358.022699][T13325] ? __fget_files+0x1c4/0x200 [ 358.027417][T13325] ? mutex_lock+0xd/0x30 [ 358.031672][T13325] ksys_read+0xeb/0x1a0 [ 358.035972][T13325] __x64_sys_read+0x42/0x50 [ 358.040491][T13325] do_syscall_64+0x41/0xc0 [ 358.044919][T13325] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 358.050831][T13325] RIP: 0033:0x7fa73334309c [ 358.055252][T13325] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 358.074914][T13325] RSP: 002b:00007fa732704160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 358.083435][T13325] RAX: ffffffffffffffda RBX: 00007fa7334b0f80 RCX: 00007fa73334309c 07:18:48 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x80040, 0x0, 0x0, 0x0) [ 358.091410][T13325] RDX: 000000000000000f RSI: 00007fa7327041e0 RDI: 0000000000000007 [ 358.099396][T13325] RBP: 00007fa7327041d0 R08: 0000000000000000 R09: 0000000000000000 [ 358.107378][T13325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 358.115463][T13325] R13: 00007ffd52bc863f R14: 00007fa732704300 R15: 0000000000022000 [ 358.123449][T13325] [ 358.126471][T13326] CPU: 0 PID: 13326 Comm: syz-executor.5 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 358.136605][T13326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 358.146708][T13326] Call Trace: [ 358.150015][T13326] [ 358.153036][T13326] dump_stack_lvl+0xda/0x130 [ 358.157692][T13326] dump_stack+0x15/0x20 [ 358.161923][T13326] should_fail_ex+0x21f/0x230 [ 358.166631][T13326] should_fail+0xb/0x10 [ 358.170796][T13326] should_fail_usercopy+0x1a/0x20 [ 358.175868][T13326] _copy_to_user+0x1e/0x90 [ 358.180294][T13326] simple_read_from_buffer+0xa0/0x110 [ 358.185687][T13326] proc_fail_nth_read+0xfc/0x140 [ 358.190633][T13326] ? proc_fault_inject_write+0x210/0x210 [ 358.196316][T13326] vfs_read+0x19f/0x5c0 [ 358.200538][T13326] ? __fget_files+0x1c4/0x200 [ 358.205291][T13326] ? mutex_lock+0xd/0x30 [ 358.209542][T13326] ksys_read+0xeb/0x1a0 [ 358.213714][T13326] __x64_sys_read+0x42/0x50 [ 358.218233][T13326] do_syscall_64+0x41/0xc0 [ 358.222657][T13326] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 358.228603][T13326] RIP: 0033:0x7f88509bc09c [ 358.233038][T13326] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 358.252667][T13326] RSP: 002b:00007f884fd7d160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 358.261121][T13326] RAX: ffffffffffffffda RBX: 00007f8850b29f80 RCX: 00007f88509bc09c [ 358.269114][T13326] RDX: 000000000000000f RSI: 00007f884fd7d1e0 RDI: 0000000000000003 [ 358.277092][T13326] RBP: 00007f884fd7d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 358.285135][T13326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 07:18:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:48 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 358.293108][T13326] R13: 00007ffda713e28f R14: 00007f884fd7d300 R15: 0000000000022000 [ 358.301085][T13326] 07:18:48 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x40000800, 0x0, 0x0, 0x0) 07:18:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 358.347389][T13338] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 358.411820][T13345] loop0: detected capacity change from 0 to 128 [ 358.443026][T13347] loop3: detected capacity change from 0 to 128 07:18:48 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:48 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38002, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:48 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x46030000, 0x0, 0x0, 0x0) 07:18:48 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x200000, 0x0, 0x0, 0x0) 07:18:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x3, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38004, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:48 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fff", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x4, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 358.695941][T13363] loop0: detected capacity change from 0 to 128 [ 358.713191][T13368] loop3: detected capacity change from 0 to 128 07:18:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38009, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x5, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x3800f, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:49 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:49 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x93000000, 0x0, 0x0, 0x0) 07:18:49 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fff", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x6, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:49 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x300000, 0x0, 0x0, 0x0) 07:18:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0xf, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x7, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 359.516543][T13387] __nla_validate_parse: 8 callbacks suppressed [ 359.516560][T13387] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 359.532318][T13386] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 07:18:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x10, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:49 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fff", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x18, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 359.568398][T13394] loop3: detected capacity change from 0 to 128 [ 359.586631][T13396] loop0: detected capacity change from 0 to 128 07:18:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x8, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x140, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 359.629201][T13400] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 359.660507][T13404] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 359.687927][T13408] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:18:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0xec0, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:50 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x9, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:50 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff0000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:50 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x95000000, 0x0, 0x0, 0x0) 07:18:50 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x400000, 0x0, 0x0, 0x0) 07:18:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x33fe0, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 360.432698][T13417] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 360.444166][T13421] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:18:50 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xa, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:50 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff0000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0xfffffdef, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 360.480694][T13427] loop3: detected capacity change from 0 to 128 [ 360.495370][T13428] loop0: detected capacity change from 0 to 128 07:18:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x10, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:50 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xb, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 360.535115][T13431] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 360.546267][T13432] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 360.588163][T13439] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 07:18:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xc, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:51 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:51 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xbc030000, 0x0, 0x0, 0x0) 07:18:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x11, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:51 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff0000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:51 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x7f0000, 0x0, 0x0, 0x0) 07:18:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x12, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xd, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:51 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x13, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:51 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xe, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:51 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 361.361012][T13458] loop0: detected capacity change from 0 to 128 [ 361.373207][T13462] loop3: detected capacity change from 0 to 128 07:18:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x14, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:52 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:52 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xf, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:52 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xc7000000, 0x0, 0x0, 0x0) 07:18:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x15, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:52 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x80ffff, 0x0, 0x0, 0x0) 07:18:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x10, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:52 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x16, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x18, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:52 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x11, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 362.252562][T13495] loop0: detected capacity change from 0 to 128 [ 362.260050][T13489] loop3: detected capacity change from 0 to 128 07:18:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x19, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x1a, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:53 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:53 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0xda030000, 0x0, 0x0, 0x0) 07:18:53 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:53 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x12, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:53 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xf0ff1f, 0x0, 0x0, 0x0) 07:18:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x1c, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:53 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x25, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:53 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:18:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x1d, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 363.106424][T13521] loop0: detected capacity change from 0 to 128 [ 363.128576][T13525] loop3: detected capacity change from 0 to 128 07:18:53 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2e, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x1e, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:53 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 07:18:54 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x48, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:54 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x1000000, 0x0, 0x0, 0x0) 07:18:54 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xe3030000, 0x0, 0x0, 0x0) 07:18:54 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 07:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x21, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x22, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x4c, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:54 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x24, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:54 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:54 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) 07:18:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x60, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 363.986300][T13557] loop3: detected capacity change from 0 to 128 [ 363.993868][T13559] loop0: detected capacity change from 0 to 128 07:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x25, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:54 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x2000000, 0x0, 0x0, 0x0) 07:18:54 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) 07:18:54 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x26, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x68, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:54 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 07:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x28, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:54 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x6c, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:54 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 07:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x29, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:54 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) [ 364.309569][T13596] loop3: detected capacity change from 0 to 128 [ 364.319020][T13597] loop0: detected capacity change from 0 to 128 07:18:54 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x4000000, 0x0, 0x0, 0x0) 07:18:54 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xfbffffff, 0x0, 0x0, 0x0) 07:18:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x74, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:54 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:54 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 07:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x2a, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x7a, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x2c, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:54 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x6c}}, 0x0) 07:18:54 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) [ 364.570641][T13623] __nla_validate_parse: 38 callbacks suppressed [ 364.570655][T13623] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 364.595023][T13626] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 364.605892][T13627] loop3: detected capacity change from 0 to 128 07:18:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x300, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 364.616259][T13629] loop0: detected capacity change from 0 to 128 07:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x2d, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 364.648710][T13630] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 364.691564][T13640] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 364.715818][T13641] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:18:54 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x6040000, 0x0, 0x0, 0x0) 07:18:54 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xff8f0000, 0x0, 0x0, 0x0) 07:18:54 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x2e, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:54 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x6c}}, 0x0) 07:18:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x500, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 364.816653][T13653] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 364.825398][T13652] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 364.835946][T13650] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x30, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:54 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x600, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:54 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:55 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x6c}}, 0x0) 07:18:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) [ 364.869780][T13659] loop0: detected capacity change from 0 to 128 [ 364.898404][T13663] loop3: detected capacity change from 0 to 128 07:18:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x31, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 364.952145][T13666] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 364.963294][T13669] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:18:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:55 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x618, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:55 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32], 0x6c}}, 0x0) 07:18:55 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x7000000, 0x0, 0x0, 0x0) 07:18:55 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0xffefff1f, 0x0, 0x0, 0x0) 07:18:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x32, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200), 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200), 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:55 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x700, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x34, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:55 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32], 0x6c}}, 0x0) 07:18:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200), 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) [ 365.148359][T13699] loop3: detected capacity change from 0 to 128 [ 365.186710][T13703] loop0: detected capacity change from 0 to 128 07:18:55 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x8000000, 0x0, 0x0, 0x0) 07:18:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x3a, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:55 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x900, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:55 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:55 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0xffff8000, 0x0, 0x0, 0x0) 07:18:55 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32], 0x6c}}, 0x0) 07:18:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x3e, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:55 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xa00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x42, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x43, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:55 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xb00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x48, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 365.399716][T13734] loop3: detected capacity change from 0 to 128 [ 365.434079][T13741] loop0: detected capacity change from 0 to 128 07:18:55 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xf000000, 0x0, 0x0, 0x0) 07:18:55 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB], 0x6c}}, 0x0) 07:18:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x49, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 365.632614][T13756] loop0: detected capacity change from 0 to 128 07:18:56 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:56 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xc00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:56 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xfffffff5, 0x0, 0x0, 0x0) 07:18:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x4a, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:56 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB], 0x6c}}, 0x0) 07:18:56 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x10000200, 0x0, 0x0, 0x0) 07:18:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x4e, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:56 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB], 0x6c}}, 0x0) 07:18:56 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xd00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x4f, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:56 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xe00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x50, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 366.252661][T13773] loop3: detected capacity change from 0 to 128 [ 366.260471][T13774] loop0: detected capacity change from 0 to 128 07:18:57 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2"], 0x6c}}, 0x0) 07:18:57 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x11000000, 0x0, 0x0, 0x0) 07:18:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xf00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x51, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:57 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xfffffffb, 0x0, 0x0, 0x0) 07:18:57 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x52, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x54, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x1100, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:57 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2"], 0x6c}}, 0x0) 07:18:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x7b, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 367.113507][T13807] loop0: detected capacity change from 0 to 128 [ 367.125173][T13806] loop3: detected capacity change from 0 to 128 07:18:57 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x1200, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x2, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 367.157093][T13813] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=123 sclass=netlink_route_socket pid=13813 comm=syz-executor.1 07:18:58 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x3, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:58 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2"], 0x6c}}, 0x0) 07:18:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x1806, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:58 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x13000000, 0x0, 0x0, 0x0) 07:18:58 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x403b7f0000, 0x0, 0x0, 0x0) 07:18:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x300, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2428, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:58 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff000000180005801400020000"], 0x6c}}, 0x0) 07:18:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x2, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2500, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 367.990545][T13839] loop0: detected capacity change from 0 to 128 [ 367.996676][T13841] loop3: detected capacity change from 0 to 128 07:18:58 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:18:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2824, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x4, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:58 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff000000180005801400020000"], 0x6c}}, 0x0) 07:18:58 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x80000000000, 0x0, 0x0, 0x0) 07:18:58 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x1f000000, 0x0, 0x0, 0x0) 07:18:58 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2e00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x9, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:59 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff000000180005801400020000"], 0x6c}}, 0x0) [ 368.865948][T13866] loop3: detected capacity change from 0 to 128 [ 368.872809][T13867] loop0: detected capacity change from 0 to 128 07:18:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x4800, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xf, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x4c00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:59 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d00000000000000"], 0x6c}}, 0x0) 07:18:59 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x1fe00000, 0x0, 0x0, 0x0) 07:18:59 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x40573b7f0000, 0x0, 0x0, 0x0) 07:18:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x696, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x6000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:18:59 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) [ 369.680672][T13889] __nla_validate_parse: 42 callbacks suppressed [ 369.680746][T13889] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:18:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x900, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:59 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d00000000000000"], 0x6c}}, 0x0) 07:18:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x6800, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 369.734242][T13899] loop3: detected capacity change from 0 to 128 [ 369.748588][T13901] loop0: detected capacity change from 0 to 128 [ 369.756598][T13894] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:18:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xf00, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:18:59 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x6c00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 369.808541][T13906] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 369.828300][T13908] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xffe, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:00 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d00000000000000"], 0x6c}}, 0x0) [ 369.882936][T13912] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 369.931267][T13919] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x7400, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x9606, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:00 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x555556ed3fff, 0x0, 0x0, 0x0) 07:19:00 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x1fffefff, 0x0, 0x0, 0x0) 07:19:00 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff"], 0x6c}}, 0x0) 07:19:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xfe0f, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x7a00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 370.552411][T13927] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 370.563212][T13928] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x34000, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x0, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:00 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff"], 0x6c}}, 0x0) [ 370.600388][T13936] loop3: detected capacity change from 0 to 128 [ 370.608122][T13935] loop0: detected capacity change from 0 to 128 [ 370.636193][T13938] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x30000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x400300, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) [ 370.712662][T13949] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x34000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:00 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x1ffff000, 0x0, 0x0, 0x0) 07:19:00 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff"], 0x6c}}, 0x0) 07:19:00 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x7f0000000000, 0x0, 0x0, 0x0) 07:19:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x1000000, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x2000000, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:00 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x400300, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x4000000, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:01 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff080007"], 0x6c}}, 0x0) 07:19:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x1000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x9000000, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 370.880290][T13972] loop0: detected capacity change from 0 to 128 [ 370.917493][T13976] loop3: detected capacity change from 0 to 128 07:19:01 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xf000000, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:01 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff080007"], 0x6c}}, 0x0) 07:19:01 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x7f3b40000000, 0x0, 0x0, 0x0) 07:19:01 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x20000000, 0x0, 0x0, 0x0) 07:19:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x96060000, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:01 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff080007"], 0x6c}}, 0x0) 07:19:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x3000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xeaffffff, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:01 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x4000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 371.640981][T14004] loop3: detected capacity change from 0 to 128 [ 371.655511][T14003] loop0: detected capacity change from 0 to 128 07:19:01 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff08000700"], 0x6c}}, 0x0) 07:19:02 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x5000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:02 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xf0ffffff, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:02 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff08000700"], 0x6c}}, 0x0) 07:19:02 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x40000800, 0x0, 0x0, 0x0) 07:19:02 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x7f3b57400000, 0x0, 0x0, 0x0) 07:19:02 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x6000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xfe0f0000, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:02 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff08000700"], 0x6c}}, 0x0) 07:19:02 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x7000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xfeffffff, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 372.511312][T14037] loop0: detected capacity change from 0 to 128 [ 372.519352][T14038] loop3: detected capacity change from 0 to 128 07:19:02 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x8000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:02 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:03 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xffffff7f, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:03 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) 07:19:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x9000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:03 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:03 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xe01f00000000, 0x0, 0x0, 0x0) 07:19:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xffffffea, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xa000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xb000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:03 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 373.401463][T14067] loop0: detected capacity change from 0 to 128 [ 373.411444][T14069] loop3: detected capacity change from 0 to 128 07:19:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xfffffff0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xc000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:04 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xfffffffe, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:04 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xfbffffff, 0x0, 0x0, 0x0) 07:19:04 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:04 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xd000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:04 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x1000000000000, 0x0, 0x0, 0x0) 07:19:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:04 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x2, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:04 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xe000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 374.278515][T14099] loop3: detected capacity change from 0 to 128 [ 374.278529][T14098] loop0: detected capacity change from 0 to 128 07:19:04 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:04 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xf000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:05 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x4, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:05 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xff8f0000, 0x0, 0x0, 0x0) 07:19:05 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x10000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:05 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x2001000000000, 0x0, 0x0, 0x0) [ 375.094215][T14120] __nla_validate_parse: 34 callbacks suppressed [ 375.094229][T14120] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x9, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:05 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x11000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 375.156794][T14122] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 375.167876][T14128] loop3: detected capacity change from 0 to 128 [ 375.194265][T14127] loop0: detected capacity change from 0 to 128 [ 375.228766][T14132] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0xf, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:05 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:05 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x12000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 375.296411][T14136] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 375.333816][T14141] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 375.409395][T14143] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:06 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x696, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:06 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0xffefff1f, 0x0, 0x0, 0x0) 07:19:06 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e0000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:06 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x18060000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:06 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x2020000000000, 0x0, 0x0, 0x0) 07:19:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x900, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:06 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x25000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 375.967699][T14152] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 375.991631][T14153] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0xf00, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 376.025350][T14162] loop3: detected capacity change from 0 to 128 [ 376.039613][T14165] loop0: detected capacity change from 0 to 128 [ 376.060211][T14163] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:06 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e0000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:06 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x28240000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 376.071077][T14166] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:06 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2e000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:06 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0xffe, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:06 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e0000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:06 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x48000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:06 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0xffff8000, 0x0, 0x0, 0x0) 07:19:06 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x8000000000000, 0x0, 0x0, 0x0) 07:19:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x9606, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:06 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x4c000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:07 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0xfe0f, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 376.891444][T14191] loop0: detected capacity change from 0 to 128 [ 376.915756][T14190] loop3: detected capacity change from 0 to 128 07:19:07 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:07 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x60000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:07 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, 0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x34000, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:07 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x68000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:07 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00000000000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:07 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x20000000000000, 0x0, 0x0, 0x0) 07:19:07 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0xfffffff5, 0x0, 0x0, 0x0) 07:19:07 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/18, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x400300, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:07 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x6c000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 377.746470][T14221] loop0: detected capacity change from 0 to 128 [ 377.760777][T14223] loop3: detected capacity change from 0 to 128 07:19:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x1000000, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:08 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/18, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:08 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x74000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:08 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040), 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:08 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xfffffffb, 0x0, 0x0, 0x0) 07:19:08 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x7a000000, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x2000000, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:08 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/18, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:08 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x30000000000000, 0x0, 0x0, 0x0) 07:19:08 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xf0ffffff, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:08 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xffffff7f, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 378.636389][T14256] loop0: detected capacity change from 0 to 128 [ 378.644282][T14257] loop3: detected capacity change from 0 to 128 07:19:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x4000000, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:08 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xfffffff0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:08 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/19, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x9000000, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:09 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040), 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0xf, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:09 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xc0217f0000, 0x0, 0x0, 0x0) 07:19:09 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/19, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0xf000000, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:09 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x40000000000000, 0x0, 0x0, 0x0) 07:19:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x14, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:09 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/19, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x96060000, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:09 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0xeaffffff, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 379.520691][T14290] loop3: detected capacity change from 0 to 128 [ 379.538845][T14289] loop0: detected capacity change from 0 to 128 07:19:10 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040), 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:10 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x140, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0xf0ffffff, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:10 executing program 4: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x80ffff, 0x0, 0x0, 0x0) 07:19:10 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x80ffff00000000, 0x0, 0x0, 0x0) 07:19:10 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0xe7217f0000, 0x0, 0x0, 0x0) 07:19:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0xfe0f0000, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:10 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0xec0, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:10 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x33fe0, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:10 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0xfffffdef, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0xfeffffff, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:10 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x2, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 380.381699][T14319] loop0: detected capacity change from 0 to 128 [ 380.395680][T14322] loop3: detected capacity change from 0 to 128 [ 380.403684][T14320] loop4: detected capacity change from 0 to 128 07:19:11 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0xffffff7f, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x3, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:11 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x80000000000, 0x0, 0x0, 0x0) 07:19:11 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (fail_nth: 1) 07:19:11 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xf0ff1f00000000, 0x0, 0x0, 0x0) 07:19:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0xffffffea, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 381.214201][T14342] __nla_validate_parse: 35 callbacks suppressed [ 381.214219][T14342] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 381.259391][T14350] loop0: detected capacity change from 0 to 128 [ 381.260580][T14351] loop3: detected capacity change from 0 to 128 [ 381.266270][T14352] FAULT_INJECTION: forcing a failure. [ 381.266270][T14352] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 381.285219][T14352] CPU: 0 PID: 14352 Comm: syz-executor.4 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 381.295350][T14352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 381.305444][T14352] Call Trace: [ 381.308724][T14352] [ 381.311668][T14352] dump_stack_lvl+0xda/0x130 [ 381.316303][T14352] dump_stack+0x15/0x20 [ 381.320477][T14352] should_fail_ex+0x21f/0x230 [ 381.325170][T14352] should_fail+0xb/0x10 [ 381.329419][T14352] should_fail_usercopy+0x1a/0x20 [ 381.334546][T14352] _copy_from_user+0x1e/0xd0 [ 381.339151][T14352] copy_msghdr_from_user+0x54/0x2a0 [ 381.344436][T14352] __sys_sendmsg+0x17d/0x270 [ 381.349120][T14352] __x64_sys_sendmsg+0x46/0x50 [ 381.353956][T14352] do_syscall_64+0x41/0xc0 [ 381.358390][T14352] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 381.364309][T14352] RIP: 0033:0x7fbaa0995389 [ 381.368797][T14352] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 381.388431][T14352] RSP: 002b:00007fba9fce7168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 381.396844][T14352] RAX: ffffffffffffffda RBX: 00007fbaa0ab5050 RCX: 00007fbaa0995389 07:19:11 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (fail_nth: 2) 07:19:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0xa, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0xfffffff0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 381.404894][T14352] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000007 [ 381.413013][T14352] RBP: 00007fba9fce71d0 R08: 0000000000000000 R09: 0000000000000000 [ 381.421042][T14352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 381.429013][T14352] R13: 00007ffee4994daf R14: 00007fba9fce7300 R15: 0000000000022000 [ 381.437007][T14352] [ 381.441573][T14343] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x10, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:11 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x17, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 381.505436][T14358] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 381.542593][T14364] FAULT_INJECTION: forcing a failure. [ 381.542593][T14364] name failslab, interval 1, probability 0, space 0, times 0 [ 381.555358][T14364] CPU: 0 PID: 14364 Comm: syz-executor.4 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 381.565522][T14364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 381.575601][T14364] Call Trace: [ 381.578900][T14364] [ 381.581861][T14364] dump_stack_lvl+0xda/0x130 [ 381.586523][T14364] dump_stack+0x15/0x20 [ 381.590812][T14364] should_fail_ex+0x21f/0x230 [ 381.595537][T14364] __should_failslab+0x92/0xa0 [ 381.600354][T14364] should_failslab+0x9/0x20 [ 381.604888][T14364] slab_pre_alloc_hook+0x38/0x180 [ 381.609991][T14364] kmem_cache_alloc_node+0x54/0x240 [ 381.615232][T14364] ? __alloc_skb+0x109/0x2e0 [ 381.619898][T14364] __alloc_skb+0x109/0x2e0 [ 381.624351][T14364] netlink_sendmsg+0x483/0x770 [ 381.629145][T14364] ? netlink_getsockopt+0x3e0/0x3e0 [ 381.634412][T14364] ____sys_sendmsg+0x37c/0x4d0 [ 381.639226][T14364] __sys_sendmsg+0x1e9/0x270 [ 381.643871][T14364] __x64_sys_sendmsg+0x46/0x50 [ 381.648668][T14364] do_syscall_64+0x41/0xc0 [ 381.653181][T14364] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 381.659149][T14364] RIP: 0033:0x7fbaa0995389 [ 381.663622][T14364] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 381.683311][T14364] RSP: 002b:00007fba9fce7168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 381.691748][T14364] RAX: ffffffffffffffda RBX: 00007fbaa0ab5050 RCX: 00007fbaa0995389 [ 381.699761][T14364] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000007 [ 381.707731][T14364] RBP: 00007fba9fce71d0 R08: 0000000000000000 R09: 0000000000000000 [ 381.715779][T14364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 381.723864][T14364] R13: 00007ffee4994daf R14: 00007fba9fce7300 R15: 0000000000022000 [ 381.731876][T14364] [ 381.751688][T14365] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:12 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:12 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (fail_nth: 3) 07:19:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0xfffffffe, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x25, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:12 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x55555643bfff, 0x0, 0x0, 0x0) 07:19:12 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 07:19:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x2, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x3, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x4, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 382.085452][T14371] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x5, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:12 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x64, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:12 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (fail_nth: 4) [ 382.132099][T14384] loop0: detected capacity change from 0 to 128 [ 382.144450][T14374] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 382.169419][T14389] loop3: detected capacity change from 0 to 128 [ 382.218144][T14394] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 382.259567][T14397] FAULT_INJECTION: forcing a failure. [ 382.259567][T14397] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 382.272689][T14397] CPU: 1 PID: 14397 Comm: syz-executor.4 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 382.282749][T14397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 382.292870][T14397] Call Trace: [ 382.296174][T14397] [ 382.299120][T14397] dump_stack_lvl+0xda/0x130 [ 382.303817][T14397] dump_stack+0x15/0x20 [ 382.308021][T14397] should_fail_ex+0x21f/0x230 [ 382.312866][T14397] should_fail+0xb/0x10 [ 382.317047][T14397] should_fail_usercopy+0x1a/0x20 [ 382.322170][T14397] _copy_from_iter+0xd8/0xa40 [ 382.326908][T14397] ? kmalloc_reserve+0xfb/0x190 [ 382.331851][T14397] ? __build_skb_around+0x196/0x1f0 [ 382.337107][T14397] ? __virt_addr_valid+0x16a/0x1b0 [ 382.342266][T14397] ? __check_object_size+0x363/0x520 [ 382.347567][T14397] netlink_sendmsg+0x53c/0x770 [ 382.352424][T14397] ? netlink_getsockopt+0x3e0/0x3e0 [ 382.357654][T14397] ____sys_sendmsg+0x37c/0x4d0 [ 382.362423][T14397] __sys_sendmsg+0x1e9/0x270 [ 382.367093][T14397] __x64_sys_sendmsg+0x46/0x50 [ 382.371924][T14397] do_syscall_64+0x41/0xc0 [ 382.376342][T14397] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 382.382279][T14397] RIP: 0033:0x7fbaa0995389 [ 382.386694][T14397] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 382.406349][T14397] RSP: 002b:00007fba9fce7168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 382.414838][T14397] RAX: ffffffffffffffda RBX: 00007fbaa0ab5050 RCX: 00007fbaa0995389 [ 382.422902][T14397] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000007 [ 382.430893][T14397] RBP: 00007fba9fce71d0 R08: 0000000000000000 R09: 0000000000000000 [ 382.438949][T14397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 382.446926][T14397] R13: 00007ffee4994daf R14: 00007fba9fce7300 R15: 0000000000022000 [ 382.454912][T14397] 07:19:13 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x6, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:13 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (fail_nth: 5) 07:19:13 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x7f0000000000, 0x0, 0x0, 0x0) 07:19:13 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 07:19:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x3, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x2, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 382.946169][T14405] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 382.977213][T14406] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 382.998479][T14416] loop0: detected capacity change from 0 to 128 [ 383.009168][T14418] loop3: detected capacity change from 0 to 128 [ 383.025930][T14420] FAULT_INJECTION: forcing a failure. [ 383.025930][T14420] name failslab, interval 1, probability 0, space 0, times 0 [ 383.038658][T14420] CPU: 0 PID: 14420 Comm: syz-executor.4 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 383.048733][T14420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 383.058864][T14420] Call Trace: [ 383.062137][T14420] [ 383.065074][T14420] dump_stack_lvl+0xda/0x130 [ 383.069730][T14420] dump_stack+0x15/0x20 [ 383.073949][T14420] should_fail_ex+0x21f/0x230 [ 383.078641][T14420] __should_failslab+0x92/0xa0 [ 383.083437][T14420] should_failslab+0x9/0x20 [ 383.087949][T14420] slab_pre_alloc_hook+0x38/0x180 [ 383.093089][T14420] kmem_cache_alloc+0x52/0x220 [ 383.097933][T14420] ? skb_clone+0x154/0x1e0 [ 383.102359][T14420] skb_clone+0x154/0x1e0 [ 383.106609][T14420] __netlink_deliver_tap+0x2c0/0x4c0 [ 383.111972][T14420] netlink_unicast+0x615/0x640 [ 383.116740][T14420] netlink_sendmsg+0x665/0x770 [ 383.121521][T14420] ? netlink_getsockopt+0x3e0/0x3e0 [ 383.126757][T14420] ____sys_sendmsg+0x37c/0x4d0 [ 383.131637][T14420] __sys_sendmsg+0x1e9/0x270 [ 383.136257][T14420] __x64_sys_sendmsg+0x46/0x50 [ 383.141059][T14420] do_syscall_64+0x41/0xc0 [ 383.145524][T14420] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 383.151518][T14420] RIP: 0033:0x7fbaa0995389 [ 383.155983][T14420] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 383.175616][T14420] RSP: 002b:00007fba9fce7168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 383.184050][T14420] RAX: ffffffffffffffda RBX: 00007fbaa0ab5050 RCX: 00007fbaa0995389 07:19:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x3, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x4, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:13 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (fail_nth: 6) [ 383.192084][T14420] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000007 [ 383.200062][T14420] RBP: 00007fba9fce71d0 R08: 0000000000000000 R09: 0000000000000000 [ 383.208036][T14420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 383.216009][T14420] R13: 00007ffee4994daf R14: 00007fba9fce7300 R15: 0000000000022000 [ 383.224068][T14420] [ 383.232560][T14413] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 07:19:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x11, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 383.343652][T14430] FAULT_INJECTION: forcing a failure. [ 383.343652][T14430] name failslab, interval 1, probability 0, space 0, times 0 [ 383.356314][T14430] CPU: 1 PID: 14430 Comm: syz-executor.4 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 383.366411][T14430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 383.376487][T14430] Call Trace: [ 383.379758][T14430] [ 383.382685][T14430] dump_stack_lvl+0xda/0x130 [ 383.387329][T14430] dump_stack+0x15/0x20 [ 383.391538][T14430] should_fail_ex+0x21f/0x230 [ 383.396227][T14430] __should_failslab+0x92/0xa0 [ 383.401050][T14430] should_failslab+0x9/0x20 [ 383.405566][T14430] slab_pre_alloc_hook+0x38/0x180 [ 383.410732][T14430] kmem_cache_alloc+0x52/0x220 [ 383.415571][T14430] ? skb_clone+0x154/0x1e0 [ 383.420066][T14430] ? xas_load+0x37c/0x390 [ 383.424407][T14430] skb_clone+0x154/0x1e0 [ 383.428771][T14430] dev_queue_xmit_nit+0x141/0x5e0 [ 383.433867][T14430] dev_hard_start_xmit+0xcf/0x3f0 [ 383.438923][T14430] ? validate_xmit_skb+0x655/0x950 [ 383.444177][T14430] __dev_queue_xmit+0xefb/0x1d10 [ 383.449151][T14430] __netlink_deliver_tap+0x3a1/0x4c0 [ 383.454457][T14430] netlink_unicast+0x615/0x640 [ 383.459283][T14430] netlink_sendmsg+0x665/0x770 [ 383.464071][T14430] ? netlink_getsockopt+0x3e0/0x3e0 [ 383.469356][T14430] ____sys_sendmsg+0x37c/0x4d0 [ 383.474137][T14430] __sys_sendmsg+0x1e9/0x270 [ 383.478755][T14430] __x64_sys_sendmsg+0x46/0x50 [ 383.483584][T14430] do_syscall_64+0x41/0xc0 [ 383.488005][T14430] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 383.493917][T14430] RIP: 0033:0x7fbaa0995389 [ 383.498337][T14430] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 383.518005][T14430] RSP: 002b:00007fba9fce7168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 383.526435][T14430] RAX: ffffffffffffffda RBX: 00007fbaa0ab5050 RCX: 00007fbaa0995389 [ 383.534501][T14430] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000007 [ 383.542494][T14430] RBP: 00007fba9fce71d0 R08: 0000000000000000 R09: 0000000000000000 [ 383.550478][T14430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 383.558462][T14430] R13: 00007ffee4994daf R14: 00007fba9fce7300 R15: 0000000000022000 [ 383.566515][T14430] 07:19:13 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x4, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:13 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 07:19:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x55, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:13 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (fail_nth: 7) 07:19:13 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x7f21c0000000, 0x0, 0x0, 0x0) 07:19:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x2, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:13 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) 07:19:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x5, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 383.854887][T14437] FAULT_INJECTION: forcing a failure. [ 383.854887][T14437] name failslab, interval 1, probability 0, space 0, times 0 [ 383.867621][T14437] CPU: 0 PID: 14437 Comm: syz-executor.4 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 383.876936][T14445] loop3: detected capacity change from 0 to 128 [ 383.877749][T14437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 383.877767][T14437] Call Trace: [ 383.888186][T14446] loop0: detected capacity change from 0 to 128 07:19:14 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0) [ 383.894065][T14437] [ 383.894075][T14437] dump_stack_lvl+0xda/0x130 [ 383.894108][T14437] dump_stack+0x15/0x20 [ 383.894149][T14437] should_fail_ex+0x21f/0x230 [ 383.920257][T14437] __should_failslab+0x92/0xa0 [ 383.925060][T14437] should_failslab+0x9/0x20 [ 383.929608][T14437] slab_pre_alloc_hook+0x38/0x180 [ 383.934720][T14437] kmem_cache_alloc_node+0x54/0x240 [ 383.939967][T14437] ? __alloc_skb+0x109/0x2e0 [ 383.944598][T14437] ? __kfree_skb+0x104/0x140 [ 383.949239][T14437] __alloc_skb+0x109/0x2e0 07:19:14 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x6, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 383.953734][T14437] netlink_ack+0x23b/0x940 [ 383.958236][T14437] ? ref_tracker_free+0x3a1/0x400 [ 383.963351][T14437] ? __dev_queue_xmit+0xabb/0x1d10 [ 383.968495][T14437] netlink_rcv_skb+0x18f/0x220 [ 383.973373][T14437] ? rtnetlink_bind+0x60/0x60 [ 383.978134][T14437] rtnetlink_rcv+0x1c/0x20 [ 383.982620][T14437] netlink_unicast+0x56f/0x640 [ 383.987429][T14437] netlink_sendmsg+0x665/0x770 [ 383.992224][T14437] ? netlink_getsockopt+0x3e0/0x3e0 [ 383.997572][T14437] ____sys_sendmsg+0x37c/0x4d0 [ 384.002440][T14437] __sys_sendmsg+0x1e9/0x270 [ 384.007090][T14437] __x64_sys_sendmsg+0x46/0x50 [ 384.011969][T14437] do_syscall_64+0x41/0xc0 [ 384.016418][T14437] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 384.022336][T14437] RIP: 0033:0x7fbaa0995389 [ 384.026781][T14437] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 384.046424][T14437] RSP: 002b:00007fba9fd08168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 07:19:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x3, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:14 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 07:19:14 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x7, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 384.054863][T14437] RAX: ffffffffffffffda RBX: 00007fbaa0ab4f80 RCX: 00007fbaa0995389 [ 384.062864][T14437] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000007 [ 384.070870][T14437] RBP: 00007fba9fd081d0 R08: 0000000000000000 R09: 0000000000000000 [ 384.078860][T14437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 384.086853][T14437] R13: 00007ffee4994daf R14: 00007fba9fd08300 R15: 0000000000022000 [ 384.094893][T14437] 07:19:14 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x604000000000000, 0x0, 0x0, 0x0) 07:19:14 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x7f21e7000000, 0x0, 0x0, 0x0) 07:19:14 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (fail_nth: 8) 07:19:14 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 07:19:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x300, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:14 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x8, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:14 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 07:19:14 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x9, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:14 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (fail_nth: 9) 07:19:14 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$P9_RMKDIR(r0, 0x0, 0x0) [ 384.243710][T14480] loop3: detected capacity change from 0 to 128 [ 384.251172][T14481] loop0: detected capacity change from 0 to 128 07:19:14 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xa, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 384.364679][T14493] FAULT_INJECTION: forcing a failure. [ 384.364679][T14493] name failslab, interval 1, probability 0, space 0, times 0 [ 384.377418][T14493] CPU: 1 PID: 14493 Comm: syz-executor.4 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 384.387534][T14493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 384.397738][T14493] Call Trace: [ 384.401029][T14493] [ 384.403960][T14493] dump_stack_lvl+0xda/0x130 [ 384.408677][T14493] dump_stack+0x15/0x20 [ 384.412846][T14493] should_fail_ex+0x21f/0x230 [ 384.417576][T14493] __should_failslab+0x92/0xa0 [ 384.422349][T14493] should_failslab+0x9/0x20 [ 384.426906][T14493] slab_pre_alloc_hook+0x38/0x180 [ 384.431978][T14493] kmem_cache_alloc+0x52/0x220 [ 384.436770][T14493] ? skb_clone+0x154/0x1e0 [ 384.441240][T14493] skb_clone+0x154/0x1e0 [ 384.445558][T14493] __netlink_deliver_tap+0x2c0/0x4c0 [ 384.450926][T14493] netlink_sendskb+0x116/0x140 [ 384.455707][T14493] netlink_unicast+0x28e/0x640 [ 384.460631][T14493] netlink_ack+0x8f3/0x940 [ 384.465128][T14493] netlink_rcv_skb+0x18f/0x220 [ 384.469939][T14493] ? rtnetlink_bind+0x60/0x60 [ 384.474696][T14493] rtnetlink_rcv+0x1c/0x20 [ 384.479128][T14493] netlink_unicast+0x56f/0x640 [ 384.483905][T14493] netlink_sendmsg+0x665/0x770 [ 384.488687][T14493] ? netlink_getsockopt+0x3e0/0x3e0 [ 384.493902][T14493] ____sys_sendmsg+0x37c/0x4d0 [ 384.498759][T14493] __sys_sendmsg+0x1e9/0x270 [ 384.503374][T14493] __x64_sys_sendmsg+0x46/0x50 [ 384.508168][T14493] do_syscall_64+0x41/0xc0 [ 384.512648][T14493] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 384.518615][T14493] RIP: 0033:0x7fbaa0995389 [ 384.523037][T14493] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 384.542779][T14493] RSP: 002b:00007fba9fd08168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 384.551297][T14493] RAX: ffffffffffffffda RBX: 00007fbaa0ab4f80 RCX: 00007fbaa0995389 07:19:14 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x700000000000000, 0x0, 0x0, 0x0) [ 384.559272][T14493] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000007 [ 384.567252][T14493] RBP: 00007fba9fd081d0 R08: 0000000000000000 R09: 0000000000000000 [ 384.575285][T14493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 384.583326][T14493] R13: 00007ffee4994daf R14: 00007fba9fd08300 R15: 0000000000022000 [ 384.591310][T14493] 07:19:14 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xe01f00000000, 0x0, 0x0, 0x0) 07:19:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x2, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:14 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (fail_nth: 10) 07:19:14 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xb, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x4, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 384.707469][T14511] loop3: detected capacity change from 0 to 128 [ 384.715129][T14504] FAULT_INJECTION: forcing a failure. [ 384.715129][T14504] name failslab, interval 1, probability 0, space 0, times 0 [ 384.727776][T14504] CPU: 1 PID: 14504 Comm: syz-executor.4 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 384.737968][T14504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 384.741746][T14513] loop0: detected capacity change from 0 to 128 [ 384.748042][T14504] Call Trace: [ 384.748052][T14504] [ 384.748060][T14504] dump_stack_lvl+0xda/0x130 [ 384.748100][T14504] dump_stack+0x15/0x20 [ 384.769417][T14504] should_fail_ex+0x21f/0x230 [ 384.774158][T14504] __should_failslab+0x92/0xa0 [ 384.778949][T14504] should_failslab+0x9/0x20 [ 384.783482][T14504] slab_pre_alloc_hook+0x38/0x180 [ 384.788579][T14504] kmem_cache_alloc+0x52/0x220 [ 384.793487][T14504] ? skb_clone+0x154/0x1e0 [ 384.797950][T14504] ? _raw_spin_lock_irqsave+0x3c/0xa0 [ 384.803361][T14504] skb_clone+0x154/0x1e0 [ 384.807669][T14504] dev_queue_xmit_nit+0x141/0x5e0 [ 384.812735][T14504] ? wake_up_q+0x3f/0x70 [ 384.817018][T14504] dev_hard_start_xmit+0xcf/0x3f0 [ 384.822148][T14504] ? validate_xmit_skb+0x655/0x950 [ 384.827344][T14504] __dev_queue_xmit+0xefb/0x1d10 [ 384.832373][T14504] __netlink_deliver_tap+0x3a1/0x4c0 [ 384.837708][T14504] netlink_sendskb+0x116/0x140 [ 384.842553][T14504] netlink_unicast+0x28e/0x640 [ 384.847363][T14504] netlink_ack+0x8f3/0x940 [ 384.851836][T14504] netlink_rcv_skb+0x18f/0x220 07:19:14 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xc, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:14 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x1000000000000, 0x0, 0x0, 0x0) 07:19:14 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xd, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:14 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x800000000000000, 0x0, 0x0, 0x0) [ 384.856666][T14504] ? rtnetlink_bind+0x60/0x60 [ 384.861444][T14504] rtnetlink_rcv+0x1c/0x20 [ 384.865925][T14504] netlink_unicast+0x56f/0x640 [ 384.870800][T14504] netlink_sendmsg+0x665/0x770 [ 384.875622][T14504] ? netlink_getsockopt+0x3e0/0x3e0 [ 384.881031][T14504] ____sys_sendmsg+0x37c/0x4d0 [ 384.885867][T14504] __sys_sendmsg+0x1e9/0x270 [ 384.890502][T14504] __x64_sys_sendmsg+0x46/0x50 [ 384.895447][T14504] do_syscall_64+0x41/0xc0 [ 384.899909][T14504] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 384.905979][T14504] RIP: 0033:0x7fbaa0995389 [ 384.910392][T14504] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 384.930070][T14504] RSP: 002b:00007fba9fd08168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 384.938557][T14504] RAX: ffffffffffffffda RBX: 00007fbaa0ab4f80 RCX: 00007fbaa0995389 [ 384.946617][T14504] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000007 [ 384.954653][T14504] RBP: 00007fba9fd081d0 R08: 0000000000000000 R09: 0000000000000000 [ 384.962640][T14504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 384.970684][T14504] R13: 00007ffee4994daf R14: 00007fba9fd08300 R15: 0000000000022000 [ 384.978766][T14504] [ 385.059975][T14522] loop3: detected capacity change from 0 to 128 [ 385.081794][T14524] loop0: detected capacity change from 0 to 128 07:19:15 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$P9_RLERROR(r0, 0x0, 0xf) 07:19:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xe, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x9, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:15 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (fail_nth: 11) 07:19:15 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xf00000000000000, 0x0, 0x0, 0x0) 07:19:15 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x2001000000000, 0x0, 0x0, 0x0) 07:19:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xf, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0xf, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:15 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x8901, 0x0) write$P9_RXATTRCREATE(r0, 0x0, 0x0) 07:19:15 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$P9_RLERROR(r0, 0x0, 0x0) 07:19:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x10, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 385.216884][T14544] loop3: detected capacity change from 0 to 128 [ 385.229068][T14548] loop0: detected capacity change from 0 to 128 [ 385.250691][T14547] FAULT_INJECTION: forcing a failure. [ 385.250691][T14547] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 385.263848][T14547] CPU: 1 PID: 14547 Comm: syz-executor.4 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 385.273968][T14547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 385.284047][T14547] Call Trace: [ 385.287346][T14547] [ 385.290350][T14547] dump_stack_lvl+0xda/0x130 [ 385.295047][T14547] dump_stack+0x15/0x20 [ 385.299236][T14547] should_fail_ex+0x21f/0x230 [ 385.303982][T14547] should_fail+0xb/0x10 [ 385.308156][T14547] should_fail_usercopy+0x1a/0x20 [ 385.313269][T14547] _copy_to_user+0x1e/0x90 07:19:15 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x2020000000000, 0x0, 0x0, 0x0) 07:19:15 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0) [ 385.317702][T14547] simple_read_from_buffer+0xa0/0x110 [ 385.323106][T14547] proc_fail_nth_read+0xfc/0x140 [ 385.328062][T14547] ? proc_fault_inject_write+0x210/0x210 [ 385.333772][T14547] vfs_read+0x19f/0x5c0 [ 385.338027][T14547] ? __fget_files+0x1c4/0x200 [ 385.342762][T14547] ? mutex_lock+0xd/0x30 [ 385.347021][T14547] ksys_read+0xeb/0x1a0 [ 385.351294][T14547] __x64_sys_read+0x42/0x50 [ 385.355877][T14547] do_syscall_64+0x41/0xc0 [ 385.360328][T14547] entry_SYSCALL_64_after_hwframe+0x63/0xcd 07:19:15 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$P9_RSTATFS(r0, 0x0, 0x0) 07:19:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x11, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 385.366328][T14547] RIP: 0033:0x7fbaa094709c [ 385.370833][T14547] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 385.390473][T14547] RSP: 002b:00007fba9fce7160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 385.398933][T14547] RAX: ffffffffffffffda RBX: 00007fbaa0ab5050 RCX: 00007fbaa094709c [ 385.406963][T14547] RDX: 000000000000000f RSI: 00007fba9fce71e0 RDI: 000000000000000a 07:19:15 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$P9_RREADDIR(r0, 0x0, 0x0) 07:19:15 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x12, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:15 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$P9_RREMOVE(r0, 0x0, 0x0) 07:19:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 385.414965][T14547] RBP: 00007fba9fce71d0 R08: 0000000000000000 R09: 0000000000000000 [ 385.422954][T14547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 385.430940][T14547] R13: 00007ffee4994daf R14: 00007fba9fce7300 R15: 0000000000022000 [ 385.438972][T14547] 07:19:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x25, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x2, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x2e, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 385.519309][T14576] loop3: detected capacity change from 0 to 128 [ 385.554267][T14581] loop0: detected capacity change from 0 to 128 07:19:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x4, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:15 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x48, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:15 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x1300000000000000, 0x0, 0x0, 0x0) 07:19:15 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x8000000000000, 0x0, 0x0, 0x0) 07:19:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x9, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:15 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x4c, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 385.760151][T14604] loop3: detected capacity change from 0 to 128 [ 385.806397][T14607] loop0: detected capacity change from 0 to 128 07:19:16 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$P9_RRENAME(r0, 0x0, 0x0) 07:19:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0xf, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:16 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x60, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:16 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x2, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:16 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 07:19:16 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x20000000000000, 0x0, 0x0, 0x0) 07:19:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 386.382655][T14616] __nla_validate_parse: 29 callbacks suppressed [ 386.382673][T14616] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 386.414577][T14626] loop3: detected capacity change from 0 to 128 [ 386.417623][T14627] loop0: detected capacity change from 0 to 128 07:19:16 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x68, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x2, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:16 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 386.445001][T14613] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:16 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x6c, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x4, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 386.507952][T14635] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 386.517431][T14636] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 386.581899][T14638] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:17 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$P9_RSETATTR(r0, 0x0, 0x0) 07:19:17 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x4, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x9, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x74, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:17 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x30000000000000, 0x0, 0x0, 0x0) 07:19:17 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 07:19:17 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$P9_RWALK(r0, 0x0, 0x0) [ 387.243100][T14653] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 387.283542][T14658] loop3: detected capacity change from 0 to 128 [ 387.286994][T14659] loop0: detected capacity change from 0 to 128 07:19:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x7a, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:17 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x5, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0xf, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 387.334776][T14649] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x696, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x300, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 387.398187][T14667] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 387.409554][T14669] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x900, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x500, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:17 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x6, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:17 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x2c00000000000000, 0x0, 0x0, 0x0) [ 387.465879][T14673] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:17 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x40000000000000, 0x0, 0x0, 0x0) 07:19:17 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x600, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 387.595187][T14690] loop3: detected capacity change from 0 to 128 [ 387.631808][T14692] loop0: detected capacity change from 0 to 128 07:19:18 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$P9_RXATTRCREATE(r0, 0x0, 0x0) 07:19:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0xf00, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:18 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x7, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x618, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:18 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 07:19:18 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x80ffff00000000, 0x0, 0x0, 0x0) 07:19:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x700, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0xffe, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x900, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:18 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x8, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x9606, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) [ 388.180387][T14710] loop0: detected capacity change from 0 to 128 [ 388.193088][T14713] loop3: detected capacity change from 0 to 128 07:19:18 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xa00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:19 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$9p(r0, 0x0, 0x0) 07:19:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xb00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0xfe0f, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:19 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x9, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:19 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x4000080000000000, 0x0, 0x0, 0x0) 07:19:19 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xf0ff1f00000000, 0x0, 0x0, 0x0) 07:19:19 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xa, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xc00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000302, 0x800}}}]}, 0x38}}, 0x0) 07:19:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xd00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000303, 0x800}}}]}, 0x38}}, 0x0) [ 389.046224][T14740] loop3: detected capacity change from 0 to 128 [ 389.071017][T14741] loop0: detected capacity change from 0 to 128 07:19:19 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xb, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0xfffffffffffffd8e) 07:19:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xe00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000304, 0x800}}}]}, 0x38}}, 0x0) 07:19:19 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 07:19:19 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:19 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x4603000000000000, 0x0, 0x0, 0x0) 07:19:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000305, 0x800}}}]}, 0x38}}, 0x0) 07:19:19 executing program 2: io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) 07:19:20 executing program 2: io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x4) 07:19:20 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xf, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xf00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 389.904548][T14776] loop0: detected capacity change from 0 to 128 [ 389.913129][T14777] loop3: detected capacity change from 0 to 128 07:19:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000306, 0x800}}}]}, 0x38}}, 0x0) 07:19:20 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)) pselect6(0x40, &(0x7f0000000000)={0x4}, &(0x7f0000000040)={0x2}, 0x0, 0x0, &(0x7f0000000180)={0x0}) 07:19:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x1100, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:20 executing program 2: socket$inet(0x2, 0x2, 0xffffffff) 07:19:20 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 07:19:20 executing program 2: io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x1}, &(0x7f0000000080)={0x4}, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 07:19:20 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x9300000000000000, 0x0, 0x0, 0x0) 07:19:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x802}}}]}, 0x38}}, 0x0) 07:19:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x1200, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:20 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x10, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:20 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000180), 0x4240, 0x0) 07:19:20 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x11, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x1806, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x804}}}]}, 0x38}}, 0x0) [ 390.191955][T14810] loop0: detected capacity change from 0 to 128 [ 390.221039][ T26] audit: type=1400 audit(1688887160.316:398): avc: denied { write } for pid=14817 comm="syz-executor.2" name="task" dev="proc" ino=61392 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 390.247472][T14819] loop3: detected capacity change from 0 to 128 [ 390.259605][ T26] audit: type=1400 audit(1688887160.346:399): avc: denied { add_name } for pid=14817 comm="syz-executor.2" name="14818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 07:19:20 executing program 2: pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1}, &(0x7f0000000180)={0x0, 0x3938700}, &(0x7f0000000200)={0x0}) 07:19:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x2428, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 390.280329][ T26] audit: type=1400 audit(1688887160.346:400): avc: denied { create } for pid=14817 comm="syz-executor.2" name="14818" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 390.300733][ T26] audit: type=1400 audit(1688887160.346:401): avc: denied { associate } for pid=14817 comm="syz-executor.2" name="14818" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 07:19:20 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 07:19:20 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x13, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:20 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x9500000000000000, 0x0, 0x0, 0x0) 07:19:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x809}}}]}, 0x38}}, 0x0) 07:19:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x2500, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:20 executing program 2: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, &(0x7f0000000080)={0x7}, 0x0, 0x0) 07:19:20 executing program 2: mq_open(&(0x7f0000000340)='%}\\(!\x00', 0x40, 0x0, &(0x7f0000000380)={0x81, 0x100000000, 0x7, 0x1}) 07:19:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x2824, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x80f}}}]}, 0x38}}, 0x0) 07:19:20 executing program 2: mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x20040, 0x0) 07:19:20 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x38, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x2e00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 390.530817][T14852] loop0: detected capacity change from 0 to 128 [ 390.540454][T14854] loop3: detected capacity change from 0 to 128 07:19:20 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x604000000000000, 0x0, 0x0, 0x0) 07:19:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0xf}}, 0x0) 07:19:20 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xbc03000000000000, 0x0, 0x0, 0x0) 07:19:20 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 07:19:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x4800, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:20 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x60, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x4c00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x10}}, 0x0) 07:19:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 07:19:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@gcm_128={{}, "0246fc14b3fe4b67", "3343e7a146a8762460ac48495dd4c79a", "d9672231", "487ccb3e26a670a9"}, 0x28) 07:19:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x18}}, 0x0) 07:19:20 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x2e) [ 390.753377][T14885] loop3: detected capacity change from 0 to 128 [ 390.766931][T14886] loop0: detected capacity change from 0 to 128 07:19:20 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 07:19:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x140}}, 0x0) 07:19:20 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xc700000000000000, 0x0, 0x0, 0x0) 07:19:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x6000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:20 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x300, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:20 executing program 2: socket$unix(0x1, 0x6536495fc5b5c50, 0x0) 07:19:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0xec0}}, 0x0) 07:19:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x6800, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:21 executing program 2: mount$9p_rdma(&(0x7f0000000180), &(0x7f0000000300)='./file1\x00', &(0x7f0000000340), 0x400, 0x0) 07:19:21 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f000000b180)='/sys/fs/cgroup', 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000004040)=[&(0x7f00000023c0)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f0000002340)="05d8e6393f4aba", 0x7}]) 07:19:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000000080)) 07:19:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x6c00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 390.922605][T14912] loop0: detected capacity change from 0 to 128 [ 390.943557][T14916] loop3: detected capacity change from 0 to 128 07:19:21 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x800000000000000, 0x0, 0x0, 0x0) 07:19:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x33fe0}}, 0x0) 07:19:21 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xda03000000000000, 0x0, 0x0, 0x0) 07:19:21 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x500, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:21 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) 07:19:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x7400, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0xfffffdef}}, 0x0) 07:19:21 executing program 2: io_setup(0x0, 0x0) memfd_create(0x0, 0x0) 07:19:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x2}, 0x0) 07:19:21 executing program 2: io_setup(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000300)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 07:19:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x3}, 0x0) [ 391.105783][T14938] loop0: detected capacity change from 0 to 128 07:19:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x7a00, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:21 executing program 2: pselect6(0x40, &(0x7f00000001c0)={0xbd}, &(0x7f0000000200)={0x9}, &(0x7f0000000240)={0x3ff}, 0x0, 0x0) 07:19:21 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x600, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 391.154541][T14946] loop3: detected capacity change from 0 to 128 07:19:21 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xf00000000000000, 0x0, 0x0, 0x0) 07:19:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x300}, 0x0) 07:19:21 executing program 2: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$tcp_mem(r0, &(0x7f0000000200), 0x48) 07:19:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x30000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:21 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xe303000000000000, 0x0, 0x0, 0x0) 07:19:21 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x700, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:21 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x14200, 0x0) 07:19:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x2}, 0x0) 07:19:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x34000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:21 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x900, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:21 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) write$P9_RXATTRCREATE(r0, 0x0, 0xfffffffffffffc6e) 07:19:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x4}, 0x0) [ 391.372779][T14971] loop0: detected capacity change from 0 to 128 [ 391.402220][T14974] __nla_validate_parse: 43 callbacks suppressed [ 391.402312][T14974] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 391.440372][T14982] loop3: detected capacity change from 0 to 128 [ 391.469905][T14978] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:21 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0) 07:19:21 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$P9_RWRITE(r0, 0x0, 0x0) 07:19:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x400300, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x9}, 0x0) 07:19:21 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) 07:19:21 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xa00, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xf}, 0x0) [ 391.598416][T14993] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x696}, 0x0) 07:19:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x1000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 391.649568][T14999] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 391.681745][T15006] loop0: detected capacity change from 0 to 128 07:19:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x900}, 0x0) 07:19:21 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xb00, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x2000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 391.720477][T15011] loop3: detected capacity change from 0 to 128 [ 391.733285][T15008] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 391.780519][T15016] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:22 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x1300000000000000, 0x0, 0x0, 0x0) [ 391.845759][T15018] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 391.941065][T15023] loop0: detected capacity change from 0 to 128 07:19:22 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x43) 07:19:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xf00}, 0x0) 07:19:22 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xc00, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:22 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x3000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:22 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x0) 07:19:22 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 07:19:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xffe}, 0x0) 07:19:22 executing program 2: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$P9_RREADLINK(r0, 0x0, 0x0) 07:19:22 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x4000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 392.462817][T15033] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 392.474382][T15035] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 392.497717][T15041] loop3: detected capacity change from 0 to 128 07:19:22 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xf00, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x9606}, 0x0) 07:19:22 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x5000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 392.515450][T15045] loop0: detected capacity change from 0 to 128 [ 392.549541][T15047] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:22 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x6000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xfe0f}, 0x0) 07:19:22 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xff3fed5655550000, 0x0, 0x0, 0x0) 07:19:22 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x1100, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x34000}, 0x0) 07:19:22 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 07:19:22 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x7000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 392.795748][T15069] loop3: detected capacity change from 0 to 128 [ 392.888879][T15077] loop0: detected capacity change from 0 to 128 07:19:23 executing program 2: pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RWSTAT(r0, &(0x7f0000000040)={0x7}, 0xfffffeaf) write$P9_RRENAME(r0, 0x0, 0x0) 07:19:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x400300}, 0x0) 07:19:23 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x1300, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x8000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:23 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x4000080000000000, 0x0, 0x0, 0x0) 07:19:23 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xff8f000000000000, 0x0, 0x0, 0x0) 07:19:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x9000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x1000000}, 0x0) 07:19:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) dup2(r0, r0) openat(r1, &(0x7f0000000100)='./file0\x00', 0x41000, 0x19a) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r2, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r3, &(0x7f0000000200), 0xe000) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 07:19:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xa000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 393.409726][T15096] loop3: detected capacity change from 0 to 128 [ 393.419977][T15099] loop0: detected capacity change from 0 to 128 07:19:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x2000000}, 0x0) 07:19:23 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x3800, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) dup2(r0, r0) (async) openat(r1, &(0x7f0000000100)='./file0\x00', 0x41000, 0x19a) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r2, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) (async) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) (async) write$cgroup_int(r3, &(0x7f0000000200), 0xe000) (async) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 07:19:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xb000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) dup2(r0, r0) openat(r1, &(0x7f0000000100)='./file0\x00', 0x41000, 0x19a) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r2, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r3, &(0x7f0000000200), 0xe000) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) (async) dup2(r0, r0) (async) openat(r1, &(0x7f0000000100)='./file0\x00', 0x41000, 0x19a) (async) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) (async) mount_setattr(r2, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) (async) openat$cgroup_ro(r2, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x7a05, 0x1700) (async) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) (async) write$cgroup_int(r3, &(0x7f0000000200), 0xe000) (async) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) (async) 07:19:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x4000000}, 0x0) 07:19:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xc000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:23 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) 07:19:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x23000012, &(0x7f0000000680)=ANY=[@ANYBLOB="7573a62655d00ce1a661b8a1e2726a71750074613d2c6e6f67727069642c64656275675f77616e745f65787472615f6973697a653d3078303030303030303030303030303034322c6e6f6175746f5f64615f616c6c6f632c6d626c6b5f696f5f7375626d69742c6572726f72733d636f6e74696e75652c7573726a71756f74613d2c009a5ee7dc80454a5753eeb5d3b4e4ef6503967d7e2c992059ff11ae3946963e55aac286a9d8b0"], 0x1, 0x44f, &(0x7f00000001c0)="$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") r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000800)=@gettaction={0xa0, 0x32, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0xc, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0x10, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0x10, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xdc}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x1000}]}, 0xa0}, 0x1, 0x0, 0x0, 0x844}, 0x8000) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x140a, 0x10, 0x70bd25, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x2}, 0x4004000) 07:19:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x9000000}, 0x0) 07:19:23 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x4788, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:23 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xffefff1f00000000, 0x0, 0x0, 0x0) 07:19:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xd000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xe000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xf000000}, 0x0) [ 393.718199][T15142] loop2: detected capacity change from 0 to 512 07:19:23 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xf000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 393.759680][T15142] ext4: Unknown parameter 'us¦&UĐ á¦a¸ˇârjqu' [ 393.761945][T15148] loop0: detected capacity change from 0 to 128 07:19:23 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x4888, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x96060000}, 0x0) 07:19:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x23000012, &(0x7f0000000680)=ANY=[@ANYBLOB="7573a62655d00ce1a661b8a1e2726a71750074613d2c6e6f67727069642c64656275675f77616e745f65787472615f6973697a653d3078303030303030303030303030303034322c6e6f6175746f5f64615f616c6c6f632c6d626c6b5f696f5f7375626d69742c6572726f72733d636f6e74696e75652c7573726a71756f74613d2c009a5ee7dc80454a5753eeb5d3b4e4ef6503967d7e2c992059ff11ae3946963e55aac286a9d8b0"], 0x1, 0x44f, &(0x7f00000001c0)="$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") (async) r0 = socket(0x10, 0x3, 0x0) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) (async) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000800)=@gettaction={0xa0, 0x32, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0xc, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0x10, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0x10, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xdc}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x1000}]}, 0xa0}, 0x1, 0x0, 0x0, 0x844}, 0x8000) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x140a, 0x10, 0x70bd25, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x2}, 0x4004000) [ 393.825521][T15154] loop3: detected capacity change from 0 to 128 [ 393.840779][T15142] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5130 sclass=netlink_route_socket pid=15142 comm=syz-executor.2 07:19:24 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x0) 07:19:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x23000012, &(0x7f0000000680)=ANY=[@ANYBLOB="7573a62655d00ce1a661b8a1e2726a71750074613d2c6e6f67727069642c64656275675f77616e745f65787472615f6973697a653d3078303030303030303030303030303034322c6e6f6175746f5f64615f616c6c6f632c6d626c6b5f696f5f7375626d69742c6572726f72733d636f6e74696e75652c7573726a71756f74613d2c009a5ee7dc80454a5753eeb5d3b4e4ef6503967d7e2c992059ff11ae3946963e55aac286a9d8b0"], 0x1, 0x44f, &(0x7f00000001c0)="$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") r0 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000800)=@gettaction={0xa0, 0x32, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0xc, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0x10, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0x10, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xdc}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x1000}]}, 0xa0}, 0x1, 0x0, 0x0, 0x844}, 0x8000) (async) sendmsg$nl_route_sched(r2, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000780)={&(0x7f0000000800)=@gettaction={0xa0, 0x32, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0xc, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0x10, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'sample\x00'}}, {0x10, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xdc}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x1000}]}, 0xa0}, 0x1, 0x0, 0x0, 0x844}, 0x8000) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x140a, 0x10, 0x70bd25, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x2}, 0x4004000) 07:19:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xeaffffff}, 0x0) 07:19:24 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x5865, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 393.972171][T15170] loop2: detected capacity change from 0 to 512 07:19:24 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 07:19:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x10000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xf0ffffff}, 0x0) 07:19:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x11000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:24 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x6000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xfe0f0000}, 0x0) [ 394.020904][T15170] ext4: Unknown parameter 'us¦&UĐ á¦a¸ˇârjqu' [ 394.043181][T15182] loop0: detected capacity change from 0 to 128 07:19:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xfeffffff}, 0x0) 07:19:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x12000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 394.133341][T15195] loop3: detected capacity change from 0 to 128 [ 394.167171][T15186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5130 sclass=netlink_route_socket pid=15186 comm=syz-executor.2 07:19:24 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xff8f000000000000, 0x0, 0x0, 0x0) 07:19:24 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x6558, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xffffff7f}, 0x0) 07:19:24 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x1bc, 0x0, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xb8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x36f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xf8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffff8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffff800}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER={0x54, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x20, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x17}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x200}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r1, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000080)) socket$inet_mptcp(0x2, 0x1, 0x106) 07:19:24 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(0xffffffffffffffff, 0x40) 07:19:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x18060000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:24 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async, rerun: 64) getsockname$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) (async, rerun: 64) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x1bc, 0x0, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xb8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x36f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xf8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffff8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffff800}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER={0x54, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x20, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x17}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x200}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) (async) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r1, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async, rerun: 32) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) (async, rerun: 32) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000080)) (async) socket$inet_mptcp(0x2, 0x1, 0x106) 07:19:24 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x8100, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xffffffea}, 0x0) 07:19:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x25000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 394.277838][T15205] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15205 comm=syz-executor.2 [ 394.301334][ T26] audit: type=1400 audit(1688887164.396:402): avc: denied { create } for pid=15204 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_route_socket permissive=1 [ 394.374928][ T26] audit: type=1400 audit(1688887164.426:403): avc: denied { write } for pid=15204 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_route_socket permissive=1 [ 394.377214][T15214] loop0: detected capacity change from 0 to 128 [ 394.396323][ T26] audit: type=1400 audit(1688887164.426:404): avc: denied { getattr } for pid=15204 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_route_socket permissive=1 [ 394.423942][ T26] audit: type=1400 audit(1688887164.426:405): avc: denied { ioctl } for pid=15204 comm="syz-executor.2" path="socket:[63914]" dev="sockfs" ino=63914 ioctlcmd=0x942d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_route_socket permissive=1 [ 394.430311][T15220] loop3: detected capacity change from 0 to 128 07:19:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x28240000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:24 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x1bc, 0x0, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0xb8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x36f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xf8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffff8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffff800}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}]}, @TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_BEARER={0x54, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x20, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x17}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x200}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r1, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socket(0x10, 0x803, 0x0) (async) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000080)) socket$inet_mptcp(0x2, 0x1, 0x106) (async) socket$inet_mptcp(0x2, 0x1, 0x106) [ 394.450707][ T26] audit: type=1400 audit(1688887164.426:406): avc: denied { create } for pid=15204 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=tcp_socket permissive=1 [ 394.491416][T15225] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15225 comm=syz-executor.2 [ 394.532754][T15234] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15234 comm=syz-executor.2 07:19:24 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xffbf435655550000, 0x0, 0x0, 0x0) 07:19:24 executing program 2: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, &(0x7f0000000100)={[0x80000001]}, 0x8) close(r0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xfd, 0x0, 0x6, 0x1, 0x0, 0x9, 0x2800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x6, 0xffffffffffffffc0}, 0x10140, 0x200, 0x400, 0x3, 0x7fff, 0x8, 0x1, 0x0, 0x7, 0x0, 0x6}, 0xffffffffffffffff, 0x2, r1, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000002180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0xabb}, 0x28) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000680)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="06000000000000002e2f66696c653000d833f8757f83f9e80b32961c8ad61e01c6bb0ad3ff90e0cd4a2f7353629523248914023ba24f2da09cfac90e686a7d36ccf5d254c9bffbeb20f9e578959f91bb61645b9ee1d0be16282c06908b44bdb68f6270fb8894645ad961813dd9b89e963a7b96c626ac66f6811ab16d4a87e77a6a1e3b5b24e8d187034f2055406e9d3bc4f0aa76a65f6b1a860413"]) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r4, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x2, &(0x7f0000000140)=@raw=[@generic={0x4, 0xe, 0x8, 0x1, 0x40}, @jmp={0x5, 0x0, 0x6, 0x9, 0x2, 0xc, 0x4}], &(0x7f00000002c0)='syzkaller\x00', 0x8, 0x87, &(0x7f0000000300)=""/135, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xb, 0x6, 0x3f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r1, r1, r1, r1, r3, r4]}, 0x80) 07:19:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xfffffff0}, 0x0) 07:19:24 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x8847, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:24 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) tkill(0xffffffffffffffff, 0x40) 07:19:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x2e000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:24 executing program 2: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, &(0x7f0000000100)={[0x80000001]}, 0x8) close(r0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xfd, 0x0, 0x6, 0x1, 0x0, 0x9, 0x2800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x6, 0xffffffffffffffc0}, 0x10140, 0x200, 0x400, 0x3, 0x7fff, 0x8, 0x1, 0x0, 0x7, 0x0, 0x6}, 0xffffffffffffffff, 0x2, r1, 0x10) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000002180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0xabb}, 0x28) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000680)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="06000000000000002e2f66696c653000d833f8757f83f9e80b32961c8ad61e01c6bb0ad3ff90e0cd4a2f7353629523248914023ba24f2da09cfac90e686a7d36ccf5d254c9bffbeb20f9e578959f91bb61645b9ee1d0be16282c06908b44bdb68f6270fb8894645ad961813dd9b89e963a7b96c626ac66f6811ab16d4a87e77a6a1e3b5b24e8d187034f2055406e9d3bc4f0aa76a65f6b1a860413"]) (async, rerun: 32) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r4, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x2, &(0x7f0000000140)=@raw=[@generic={0x4, 0xe, 0x8, 0x1, 0x40}, @jmp={0x5, 0x0, 0x6, 0x9, 0x2, 0xc, 0x4}], &(0x7f00000002c0)='syzkaller\x00', 0x8, 0x87, &(0x7f0000000300)=""/135, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xb, 0x6, 0x3f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r1, r1, r1, r1, r3, r4]}, 0x80) 07:19:24 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x8848, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xfffffffe}, 0x0) 07:19:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x40030000000000}, 0x0) 07:19:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x48000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 394.686853][T15248] loop0: detected capacity change from 0 to 128 07:19:24 executing program 2: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd(r0, &(0x7f0000000100)={[0x80000001]}, 0x8) (async) close(r0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xfd, 0x0, 0x6, 0x1, 0x0, 0x9, 0x2800, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x6, 0xffffffffffffffc0}, 0x10140, 0x200, 0x400, 0x3, 0x7fff, 0x8, 0x1, 0x0, 0x7, 0x0, 0x6}, 0xffffffffffffffff, 0x2, r1, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f0000002180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0xabb}, 0x28) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000680)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="06000000000000002e2f66696c653000d833f8757f83f9e80b32961c8ad61e01c6bb0ad3ff90e0cd4a2f7353629523248914023ba24f2da09cfac90e686a7d36ccf5d254c9bffbeb20f9e578959f91bb61645b9ee1d0be16282c06908b44bdb68f6270fb8894645ad961813dd9b89e963a7b96c626ac66f6811ab16d4a87e77a6a1e3b5b24e8d187034f2055406e9d3bc4f0aa76a65f6b1a860413"]) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r4, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x2, &(0x7f0000000140)=@raw=[@generic={0x4, 0xe, 0x8, 0x1, 0x40}, @jmp={0x5, 0x0, 0x6, 0x9, 0x2, 0xc, 0x4}], &(0x7f00000002c0)='syzkaller\x00', 0x8, 0x87, &(0x7f0000000300)=""/135, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xb, 0x6, 0x3f}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r1, r1, r1, r1, r3, r4]}, 0x80) 07:19:24 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xffefff1f00000000, 0x0, 0x0, 0x0) 07:19:24 executing program 2: r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x1c}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=@getchain={0x5c, 0x66, 0x2, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, r7, {0x8, 0xfff2}, {0xc, 0x8}, {0xfff2, 0xb}}, [{0x8, 0xb, 0x800}, {0x8}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x7f}, {0x8, 0xb, 0x2}, {0x8, 0xb, 0xf9}, {0x8, 0xb, 0x4db}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8004}, 0x20000040) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) 07:19:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x100000000000000}, 0x0) 07:19:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x4c000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 394.861765][T15279] loop0: detected capacity change from 0 to 128 [ 394.915446][T15275] bridge27: entered promiscuous mode [ 394.922569][T15275] bridge27: left promiscuous mode 07:19:25 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async, rerun: 64) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) tkill(0xffffffffffffffff, 0x40) 07:19:25 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x34000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x200000000000000}, 0x0) 07:19:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x60000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:25 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 07:19:25 executing program 2: r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0), r0) (async) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x1c}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) (async) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=@getchain={0x5c, 0x66, 0x2, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, r7, {0x8, 0xfff2}, {0xc, 0x8}, {0xfff2, 0xb}}, [{0x8, 0xb, 0x800}, {0x8}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x7f}, {0x8, 0xb, 0x2}, {0x8, 0xb, 0xf9}, {0x8, 0xb, 0x4db}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8004}, 0x20000040) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) 07:19:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x400000000000000}, 0x0) 07:19:25 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x400300, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x68000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x900000000000000}, 0x0) 07:19:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x6c000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 395.627972][T15293] bridge28: entered promiscuous mode [ 395.635277][T15301] loop0: detected capacity change from 0 to 128 [ 395.642303][T15299] loop3: detected capacity change from 0 to 128 [ 395.653157][T15293] bridge28: left promiscuous mode 07:19:25 executing program 2: r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0), r0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) (async) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) r4 = socket$nl_route(0x10, 0x3, 0x0) (async) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x1c}}, 0x0) (async) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) (async) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=@getchain={0x5c, 0x66, 0x2, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, r7, {0x8, 0xfff2}, {0xc, 0x8}, {0xfff2, 0xb}}, [{0x8, 0xb, 0x800}, {0x8}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x7f}, {0x8, 0xb, 0x2}, {0x8, 0xb, 0xf9}, {0x8, 0xb, 0x4db}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8004}, 0x20000040) (async) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}}, 0x0) 07:19:26 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c6c6f775f0700696d653d30303030303030303030303030303030303030303030302c646f74732c646f00002c6eb2b83704cd2b88d46f646f74732c6e6f646f74732c6572726f72733d636f6e74696e75652c646973636172642c00"], 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:26 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x74000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:26 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x1000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xf00000000000000}, 0x0) 07:19:26 executing program 2: r0 = socket(0x2, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f0000000e00)=[{{&(0x7f0000000340)={0x2, 0x0, @local}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000380)="eb", 0x1}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="1400000000000000000000000000000000000010000000000000008400000007000000"], 0x28}}], 0x1, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)={0x148, 0x0, 0x300, 0x70bd27, 0x25dfdbfd, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6}}]}, 0x148}, 0x1, 0x0, 0x0, 0x24000880}, 0x4c881) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@newchain={0x34, 0x64, 0x10, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xffff, 0x7}, {0xd}, {0x6, 0x8}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x7}}, @TCA_CHAIN={0x8, 0xb, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004000}, 0x20044814) 07:19:26 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) r0 = syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0x3, &(0x7f0000000480)={0x1f, 0x100}, &(0x7f00000004c0)) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_clone(0x4243180, &(0x7f0000000000)="eb0c735404338f74bd51d5f9af04e43dc6d8c9310fbfc76d9cdd2349bb8aef37bf3d6cda86335aa5c8794e86759351843adbf3dc58e9401d113f78db19c88382e151141c22b34af907c0f3d318b12a41e08b64b3f7a54afd045bbb921724a0b03b5b77e7531b9cfa09a5a9d676a840402ab66dc602b8a805c1fb91c21b1704510277219baa6244b0924c9d8c93c4dad625c23c305f198df1d237c2d1324402592b16d8c8556986ce8c999cc6d6b9182e362e0c6e401f5a3ae70b2dabd9f6b9e81ce07ee81cb1c20bbd19bf3d46fbb920140c99dafa92902e15eba7db04f96ea03d7a7c73ca4901", 0xe7, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)="ef4330119bfbb6270a59acee2842e56b0dbafbd34c9ff6513f233184b11546e91b0c6c0832b31423bc06f678902c075d6c6af0cac29c5c2c8ae46e3417a8ce2e2e280f4156cdc6cc700e1ba845dd482b295e88d1edd2c17a0705e61c9845fdb699df12e38ded9d122a4932024b17fe58213e5530dd5e8d188082d9a8dea8") perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x20, 0x7, 0x7, 0x8, 0x0, 0xffffffff, 0x6e3b04f117a6932c, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0xfffffffeffffffff, 0x7f}, 0x4000, 0x400, 0x1, 0xa, 0xe9d, 0x6, 0x8, 0x0, 0x3, 0x0, 0x4}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r2, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x8, 0x7f, 0x8, 0x0, 0x0, 0x42, 0x1240, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000300), 0x4}, 0x8, 0xb0, 0x6, 0x6, 0x8001, 0x2, 0xa9ff, 0x0, 0x5, 0x0, 0x80}, r1, 0xb, r2, 0x2) 07:19:26 executing program 2: r0 = socket(0x2, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f0000000e00)=[{{&(0x7f0000000340)={0x2, 0x0, @local}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000380)="eb", 0x1}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="1400000000000000000000000000000000000010000000000000008400000007000000"], 0x28}}], 0x1, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)={0x148, 0x0, 0x300, 0x70bd27, 0x25dfdbfd, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6}}]}, 0x148}, 0x1, 0x0, 0x0, 0x24000880}, 0x4c881) (async) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@newchain={0x34, 0x64, 0x10, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xffff, 0x7}, {0xd}, {0x6, 0x8}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x7}}, @TCA_CHAIN={0x8, 0xb, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004000}, 0x20044814) 07:19:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x9606000000000000}, 0x0) [ 396.446239][T15343] __nla_validate_parse: 42 callbacks suppressed [ 396.446253][T15343] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:26 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x7a000000, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xeaffffff00000000}, 0x0) 07:19:26 executing program 2: r0 = socket(0x2, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f0000000e00)=[{{&(0x7f0000000340)={0x2, 0x0, @local}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000380)="eb", 0x1}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="1400000000000000000000000000000000000010000000000000008400000007000000"], 0x28}}], 0x1, 0x0) (async) sendmmsg$inet(r0, &(0x7f0000000e00)=[{{&(0x7f0000000340)={0x2, 0x0, @local}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000380)="eb", 0x1}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="1400000000000000000000000000000000000010000000000000008400000007000000"], 0x28}}], 0x1, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)={0x148, 0x0, 0x300, 0x70bd27, 0x25dfdbfd, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x3}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6}}]}, 0x148}, 0x1, 0x0, 0x0, 0x24000880}, 0x4c881) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@newchain={0x34, 0x64, 0x10, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xffff, 0x7}, {0xd}, {0x6, 0x8}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x7}}, @TCA_CHAIN={0x8, 0xb, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004000}, 0x20044814) [ 396.510299][T15345] loop0: detected capacity change from 0 to 128 [ 396.556219][T15342] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 396.576428][T15356] loop3: detected capacity change from 0 to 128 07:19:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000080)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05c07001a000100003b00897b2a1d84f5c7ffff00000000000067e77dc70b90bbb45efd97899a16f2df4fa2a8f069d9b047389f672eb3080000000000000065890d2d0d1b8d3d62f6d77b0283e166e2ca4c35483d3f00d6bf7da9299e6681c96daf520300a1402714af991182ea829f4a6cab12d75a852b3e4470420877efbec0ff16cca5c680017e15f9b683e63cfff7c638bca835b33bc18c4ed00400d285197b0241569048b5b416ba1c578aba30fcafb13507984e07daab2a363b217be5a338392f831637ee8c25bb2183634a33b18c4b455ab222d7060000000000665106000000a803d1b56126efec0225a5433883b0d17cb21dbfd886caf2624e7f00da0ef9893ef57c79a182dceca9446a9f8b001e53b29c0c698ed30d8942e94ac057bde74e42021d895c22b6400000002b2c604e010000000f08bfdcebee7a07856a3a23e0907f3dc0eb52c40f6b21c14832dd9845ee8d8733b53acf9b2e840713cba86d43a570ee3589b7e9000000000000000000000000000000dc85131317c56465978d957d000000000000000000000000000000000000000000000000000000000000000000301171e8e3a2d0c842c20fd293c073b93f7662fad1f4ae3e1fe359aa29a4b8965229fa06b0fb2e23d2644cfbdbd6929aa42151ea48334743ad0c378641e74d55d6cd7b098599190100000055ec9c0c26b71588d6fc97e3098fb0e778be446659cf7f5e7f848d85de70c3c426a539a9a0e92e7bbf77528053dcb3b791b8e3faae507a3b721b670b06f78bb09e82ecc85a4bbc596d8ce02a2cbede5573f8bdc84d61c5634fffa50e74ec0f2da4f3d82c2d2b5a20ec152df14481c3bb59a23e014d07fc070d87f58118f468bf80283e0ce7efda7906f9c53319aef22e01a9ba5649fc10fb5b8132dcf42c47a4b79efb9f720ebd2dcc1634f870cee6201bc0ad9e17c4003a17de505bed8fded3053cb455636132bdae3239b9c8b437256ac21a49c4f03b268c47e9becbaff440728429f9e0b0222485188b745b3cff010000000000000bcd79b956010954a8faffff5629b9c40c8e044345a88555cf26b8d1981d36a62572434f85013402a967f1", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) r5 = socket$inet6(0xa, 0x5, 0x4) r6 = socket(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r9, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) ioctl$BTRFS_IOC_RM_DEV(r5, 0x5000940b, &(0x7f0000001280)={{r6}, "64ece2a7e26955e7fb5474734981cf9326f60fa14b83e819a4be2f0d0bc855b17c1d4f6f229841a1d0676b89e3ef494a0219412d0d54f039e46c48d5f0a8bf2c96ee6559afbfe0b0bbfbb7e9a75838e8cd2ad2c88f7cd92e6db2d7f8295245174e529b1c97b6fab71b28e7c4595f7d62f15a03b3b7bb5cfc2d05b932d5ccd0079504792eaf95516d82ee4380e073e62c05c733d2f4c4d4940af6246a9a32593a29dfa7ef7b777f359c040e499062fafd6951b6719f4ccabae36f7b9c04ffb90774ed9a3de1e7ea676b749cea2593494e6701aa8a27155201adc102bdb3035510603f8f34d2abcfa7a8eaaa1d921944aa8039ba188ca6a80f4a82a4a7b21d66a147cf38fab88324b5ed37c2b17060e763ae85c24b9863053a3c4f9e3acd90e4d9a0c3a303c6d82ee763e74ef00e1dc9562a109c8e55bda462020c24d2ab9ebe7969e773c1b5d6fe1a69452dc9a85bbc3e06be8333731c65277e222de5f4a33bc34cd1790f6814cf1a29349baa9d5eecc3a41865d14016b3d5af54a9cda989547f4a17f2e87b62b18c37d369fab665ff3a6b8d62e37dd37dc4a8c7bc5720cd639deb4f03aa05790dfe33e4cecd5cd93d24afd7a59f3f47aa2680e8e6af2cb5fc18a022adc677624559c6f2b739fcabff4a7b327f8118c6735a02b04780eed1c94ebdfe4504d1b7789eca291ea859f85534270ebabb031a761baa46678669a595102c1912b23f9352dc90c4e82c85574e3d094d5e92291871869b169b4dc12041647ed878c9f3ac8b8d50dd563cee25919bc3c8ec444af190663a51e7bbf353bebb6f2b6d46f12df9a49b520ebd719a1795d98ec766a3b9e2430aeff7f8ea4ee5212be966669cc904617cf3957666c43761b95b73c492502e74d85942a772f30f69e0f387876a81b7843c1bdd8cbdf3d356988b44ff3d6b9c95f87fa859a276919628d1e712a35d8438c05fb063b058b530c8be189227dea87ab00bdcf820a1f08c764bf43d563affc64f68ad400fa917ed72a4d56481d45f725f80248d05ccb2954ff5612f166a33f548463028f3d5fdce15f0d139c9a64b8294ee94b9dab2327f13cffe3632834f1220b890f8e963a3fe61e38bb1ff0a4e364c0b60ed2c3e5fc32aa38a40791480dcfa3700c1e10a6ea86629639fde46ae384e529b0a3f4336f1db53fdbef019993950e56e79d537fe3ff52943faec993c44263ff9c1dbd83b5f64118880eac76ecf7acda06758d1b294a7ee35fec9a20440b11b2d62074a9dd7245d5e399dc137915c274950c43c4a3a797d82dd450fe4b99160ed892a7b6c3d3e0b4dfad63c8505db264950b55fb59755ac045a2e0985035bed44a507eb1c020241ce80a6f7f9d1af4cb57a560d6594a4dc1d3453090faf1af83657ca63286105648d51c733609646c87adbf205071e22b1d8de02942edbbc059d51f55673e91e199bd6b3d6a57f6763bcf09217d6e256b96e3e7edca9d0fb0768bcade57c43210ea902144463142804455c982c89dbf6a925a306ec6e838c41b8ef93ab592ca7ab2d355656e478616dfaf40295785d00950e01d866344380b86cd71f6a472a5807db838d3f76cd090f6c7f18291545acc3a4b2995b4e09e5161b61879a36306c1fb728ab542f541e07571b8898e660a010a1a82b2e2772e243e23da383f7b965e7c4730b3fb37f0c9f1e5f23421046cb0572f0b3b87f90f5d21e339f9b81e081bb13a024326b01f6f064ab693e4dd55d750661d1d46cd22bf1f3276e667746882c6487b60a8e4ccaf884f34b9dbac1ed4a64cabc63c85916ee211d51849c30ef09c37c3b86cdee3a6d694da9ab873ba837acc2b55b51568a445cdc9282a34d2e4bf6c4797da3f839a8477765c5d3efe8f6722bd773b6c3954c924b294bc1d8d057d83c0d39e2b6c9bd69abc4907a6f1c78e4f7dba2d97967f526d5a734158b2cffcc4084287854fc10b0553bc269a80ee3b8da8edb75c3d969fc98bd78ec3fe837031dc619384841e6d8fd6cf6429c59cfbf966e598d7ea7b911975fbe8ac1b49ecf92c2c467775750bdb774a1c2ede2a9e1b00c4784d9bf0661f9385fa1755854865db82187fa5e96397705512f28ceb6badd4228721c1c23536bf507167133bcafa4220866c8f97542b763b8a0f1c30a09a9969ac41fadb781af6eb7dbf8cd3a443a064269a37f5f3fd77d061bf1dcf364f185c08a28dc7f127039c5ad897d76b852b9ae2d01a240beb3eaf717482a4c7f4ace882cbdf16fff11da8e26d8547547395e380afd8b102785503069e48aa935dad03c149ebc660e5f02377a9988b74f97ce802240dc23e6b8ec7d176c449b3d4a1d2ef9735c64cd5e3bb7068ab7b7e6cc1ef2f09ec81ec595c44653e2e90eda0a0a349dc58af9d56ba8c522ea47870415ed53d2eeeba2ad142cd71c8a57c29fa8f8f607e730c428dd21bccc1bf4bd2d6ff083158de82b857a224da44d38fc071fb8062b6c1179f7c1113b819c4886de6532727c9124743fdc03dc67b682d565dad2497a480bdbb2e53b5b7206d8877d14e9491ad1bfcb17a5f17ffea7fe402bf8f286d25f759e92de72fee79dadf0948824f1c28019402a7cae869b0bff84d78927258059f395672d19613d9f748ed436555cd5f6b675624aaf94501323b840049d279120ebad2e790aec6059ed4d2570619e2b4f0b25b4b80a897322d0347a04f31fd6ac8439ff783b90cb46b73b5fb6c7c026321ca3db33230ea7ef8029e3be40d5b586ea5b69eee1861f2439c14ae844eceb6682f3a49afc22343f632b7fe0b8c6cd39e4127754484163498a240324d0704b04f8e019649f8a65daffac98bb4b6546eef7e5c343f20e8d8d853c19cd38f04e6c52e97663b754d7db6c071c4dbfbff0244a360b9f9a8d9e1b555267279f3ac1d299c9932787fd4854b0b9388a5c6e23d9d720c44f0493f456fb849de31a7a8030f5af15972fa227b65367cdd7b1970ddfa46dac2083c4f8cfc8ae28f9928eee79ce354dcbe6ba5201a97e376ad01a7c82ae3725d1028a8d1d4e67f3464607cb107f2b84ab8025de3d4c523fab31ebc707ce1e96ed7eb813f099888733b2212178ed43ecea7053d8f59237852d3ff47e18a11cb5b6c249e6fb64c86341f64ad2409612e0ba1f4a6aa9cd6f9c1b25588aa8cd9153a7d276bcbcf7b2c34d60da07aa5ccacb63d260aea8e4c86e2052c9e4a768c63f551ca6151d92e579b6ad3b040e0cbc7b888a46f1779b5f472302d5b5d86628541f29da3e1e63701d09a192addbc6f84a3877b718f6def5fa601ea622f196c2a6b5e453183d12dd29280d71fb0c045c9ae79da9e12d5302a356ea45e691aaec7026d2b13f6f3c32cdff492e283253e449affceb7b7ba52d89fa430cd7fa55801b882758c12a88279321b4eaeb3c4dc5dd175000318b5d7a60e6cd196641ae1209f7a967c28c2de1db639cf36ce047f89b457419c313757012af59337a140e5471064badf24c84666ddb8a14ea348e0467644b125d0ab3a5cd0168876bbeedc48ceaa77fa358f7f3e0feb950a896cd81495e3146998cf171b7b76d37878ce35c4306f49ea665e3447e36e179fc004b43f96263c396954675a4ba8c63c1ee6976ab5c0ea96a2b38e5488b10ed3c38cc0ac350425d1aa14ae351d6d06ecb92ed3d4d9379da01a21ae119cad06aaa1ad2b027463f492e17eaab99748e5460f2f2c89f8df62b36666a6dd0db4638b2397a2150287baa8dab7759808dbe395272685e83e43d9b07d1cd0d55283405df70c3e8a7a2866fad71e4c1b2f08fd8c4c25d1215e1aa45572d0ffb5d7a604d4a5bf0c4aa399ad11d16f4fbb88cfaaad3104df3191e0a6ce98bc29d6aa43d47ac48495c2057c09daf9ccbbbd13ef50797996cb3d569efd830ac72a7ec14083497ebe9726f0c1086bcf0aa379f11ea805777b5646fc7164437321578a56ad88eb074d0cf46b359cd94399c6972be2b60919d1d00f9bbac4abefa5eaab69a045fa358014a30caa67853389ad5006de49a9509c920b295c6fe1a11540e30b1b0d818285db8a120f42882e66a89026c94b51113e1110543ed5466c0fd636147af92636caf6d5129d3e7a2d1c6b191d2b1fc111862cf407903b9c8f11b9562211f6c15186bb396fa9b5691e5c6c76d74cf56f775336a9d8bf59eacbf4f0de9c0618be5c91ff8f9b28a8b73aa30b25147bf47dff54761eb7debd9415948c1fa02ba22dc26f497a3150985e78eb94b97aeb1144202c864e447af82c838c35edd8628e043e55e49ca266a20638d26d28db92d6e7546fef36a1973d312ead2859a3b0556619f6f50a9e3e1da58aca32728ff9d52a2bec941d592614c1a18a00944fdd3159420a1846445ce0a54729f2bab1f21701d911d8d35d8494ad04a2c7ad3babe8c31638b137ee3dc608a0b830cc59de93864fb85a0bf96be9b8d652ae9c0e4e591b65d56da74680783eaad35a11eeeaa7181cce25ac960d33e13dab70e3da1bfee35de23251f82d61d5b13d46d6b3390eaff0256b84710d49cf8abc6e0923ede7a71ca265ab0ddd523b6966ae9817814c27ed791be85efddc1f1de17008e988072815a16988a66277984b8b2c84eb93b0c954584787be0b11157b59c0f74ccb4908505ea6f066bb75df3adf9754e6c5eeda3a1f7742b756cc24e7289844ced0778c9650aa82c04eb91ea06e58a1295e5d867af93886fb350cb661a490dcb65474a9aec1ae998963010e8e5d471473a046aae01d377ed541dfeb6c6198b40b453b95b07048d9a465e063b7b81cb8cbd3a1503e6c8fbdb95271392a08329769e2c99ac35cbcc54196353d429cf9ca8eb44772fd35d509620b3c67e4958ec3c234d4eca8317132570d92677adafb77c213b55f7ffffd5bbe680f02fb022051e1b0ba9135cbbf7d83b3857826335c94d27f4f08d52dc2c9e9d323ce4b4facc30310b772e2d45e3e859d78092b790a8d24094928ae32956118d20f06aa04d15ea6d26502500f91b72163642f61d7c09834323ab06b86f88fafc09631c43bae336b0f844b6c299f026b600df6c7e24dacc0c35e66d11c7f52618de2ceb32c8e08dccb8c2fe5c46369e7939385a2066e1bc7c7a894c6250ff314818f848ab43b1f7701b474f0d4b9e9d5875808cdd98a7456d23c80059fa6fa60e1a70f10d011c0792149bb4733671dfbd7080bf35c7ab2813f0cf577676a15eb5657d6b7433149a7b01d997d057c296642b07381e75040c5d936be0e7114ceb6ebbaa71a32883723aae6cb983127db897460bfcb2bce7a3085370a598fc7b8d97d6c5bdad4df5ad32b8aa4de42d5094a5211de91a5618bbdba38c4411880e43bc98ea5a4ac6cd4a922eca71ae0949d8e8aa7b043f0db8497b5825537bb9402b47b32feebdfe0f4762be94752c132066d020c0fa872c3c5b4b72761b47811fe00477f2be847eb2724c7eb64183a9515b4e9162e59dfb179ac8d94e0883d4c1174f8a90edf62fdaae700dff8f36d2576ae8a50ca54221911e565dbee947827614091ac3f31561e4954ce6ec2e0a022773929f0477d69813b2ed6a7c4b47fca5252f88d69a09439311705e8abb725f0f378ec64e6240e67b4e9ee6b0da6b484516b362e1cd52aab5b86017ee72e574ab934975f625f36fb441ac50b253817fee13e0aad9ab80db3285cfa100a570655194f1eaabef8c4af5e1f1aae77eab35c471476b9f674206923b082a6d0f5c25ad7f1ce20f980a0243ef85e726c97083c43059d9d92c26442cd454246b820f73917b649e369323864b363b524be651"}) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r10, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) connect$inet(r2, &(0x7f0000000580)={0x2, 0x4e22, @remote}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f00000003c0)={0xfffffffe, 0xa87a, 0x4be38e54, {0xffffffe0, 0x7}, 0x7f}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000500)={&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/20, 0x14, 0x0, &(0x7f0000000440)=""/173, 0xad}, &(0x7f0000000540)=0x40) getsockopt$inet_int(r1, 0x10d, 0xf, 0x0, &(0x7f00000000c0)) [ 396.598674][T15356] FAT-fs (loop3): Unrecognized mount option "allow_" or missing value [ 396.657648][T15357] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xf0ffffff00000000}, 0x0) 07:19:26 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x2000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:26 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async, rerun: 32) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c6c6f775f0700696d653d30303030303030303030303030303030303030303030302c646f74732c646f00002c6eb2b83704cd2b88d46f646f74732c6e6f646f74732c6572726f72733d636f6e74696e75652c646973636172642c00"], 0x1, 0x284, &(0x7f0000000500)="$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") (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:26 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xf0ffffff, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xfe0f000000000000}, 0x0) 07:19:26 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) r0 = syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) prlimit64(0x0, 0x3, &(0x7f0000000480)={0x1f, 0x100}, &(0x7f00000004c0)) (async) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = syz_clone(0x4243180, &(0x7f0000000000)="eb0c735404338f74bd51d5f9af04e43dc6d8c9310fbfc76d9cdd2349bb8aef37bf3d6cda86335aa5c8794e86759351843adbf3dc58e9401d113f78db19c88382e151141c22b34af907c0f3d318b12a41e08b64b3f7a54afd045bbb921724a0b03b5b77e7531b9cfa09a5a9d676a840402ab66dc602b8a805c1fb91c21b1704510277219baa6244b0924c9d8c93c4dad625c23c305f198df1d237c2d1324402592b16d8c8556986ce8c999cc6d6b9182e362e0c6e401f5a3ae70b2dabd9f6b9e81ce07ee81cb1c20bbd19bf3d46fbb920140c99dafa92902e15eba7db04f96ea03d7a7c73ca4901", 0xe7, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)="ef4330119bfbb6270a59acee2842e56b0dbafbd34c9ff6513f233184b11546e91b0c6c0832b31423bc06f678902c075d6c6af0cac29c5c2c8ae46e3417a8ce2e2e280f4156cdc6cc700e1ba845dd482b295e88d1edd2c17a0705e61c9845fdb699df12e38ded9d122a4932024b17fe58213e5530dd5e8d188082d9a8dea8") (async) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x20, 0x7, 0x7, 0x8, 0x0, 0xffffffff, 0x6e3b04f117a6932c, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0xfffffffeffffffff, 0x7f}, 0x4000, 0x400, 0x1, 0xa, 0xe9d, 0x6, 0x8, 0x0, 0x3, 0x0, 0x4}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r2, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x8, 0x7f, 0x8, 0x0, 0x0, 0x42, 0x1240, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000300), 0x4}, 0x8, 0xb0, 0x6, 0x6, 0x8001, 0x2, 0xa9ff, 0x0, 0x5, 0x0, 0x80}, r1, 0xb, r2, 0x2) 07:19:26 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c6c6f775f0700696d653d30303030303030303030303030303030303030303030302c646f74732c646f00002c6eb2b83704cd2b88d46f646f74732c6e6f646f74732c6572726f72733d636f6e74696e75652c646973636172642c00"], 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) [ 396.739769][T15363] loop2: detected capacity change from 0 to 8192 [ 396.768981][T15370] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000080)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) (async) r1 = socket$inet_dccp(0x2, 0x6, 0x0) (async) r2 = socket(0x10, 0x3, 0x0) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) (async) r4 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) r5 = socket$inet6(0xa, 0x5, 0x4) r6 = socket(0x10, 0x3, 0x0) (async) r7 = socket$nl_route(0x10, 0x3, 0x0) (async) r8 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r9, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) ioctl$BTRFS_IOC_RM_DEV(r5, 0x5000940b, &(0x7f0000001280)={{r6}, "64ece2a7e26955e7fb5474734981cf9326f60fa14b83e819a4be2f0d0bc855b17c1d4f6f229841a1d0676b89e3ef494a0219412d0d54f039e46c48d5f0a8bf2c96ee6559afbfe0b0bbfbb7e9a75838e8cd2ad2c88f7cd92e6db2d7f8295245174e529b1c97b6fab71b28e7c4595f7d62f15a03b3b7bb5cfc2d05b932d5ccd0079504792eaf95516d82ee4380e073e62c05c733d2f4c4d4940af6246a9a32593a29dfa7ef7b777f359c040e499062fafd6951b6719f4ccabae36f7b9c04ffb90774ed9a3de1e7ea676b749cea2593494e6701aa8a27155201adc102bdb3035510603f8f34d2abcfa7a8eaaa1d921944aa8039ba188ca6a80f4a82a4a7b21d66a147cf38fab88324b5ed37c2b17060e763ae85c24b9863053a3c4f9e3acd90e4d9a0c3a303c6d82ee763e74ef00e1dc9562a109c8e55bda462020c24d2ab9ebe7969e773c1b5d6fe1a69452dc9a85bbc3e06be8333731c65277e222de5f4a33bc34cd1790f6814cf1a29349baa9d5eecc3a41865d14016b3d5af54a9cda989547f4a17f2e87b62b18c37d369fab665ff3a6b8d62e37dd37dc4a8c7bc5720cd639deb4f03aa05790dfe33e4cecd5cd93d24afd7a59f3f47aa2680e8e6af2cb5fc18a022adc677624559c6f2b739fcabff4a7b327f8118c6735a02b04780eed1c94ebdfe4504d1b7789eca291ea859f85534270ebabb031a761baa46678669a595102c1912b23f9352dc90c4e82c85574e3d094d5e92291871869b169b4dc12041647ed878c9f3ac8b8d50dd563cee25919bc3c8ec444af190663a51e7bbf353bebb6f2b6d46f12df9a49b520ebd719a1795d98ec766a3b9e2430aeff7f8ea4ee5212be966669cc904617cf3957666c43761b95b73c492502e74d85942a772f30f69e0f387876a81b7843c1bdd8cbdf3d356988b44ff3d6b9c95f87fa859a276919628d1e712a35d8438c05fb063b058b530c8be189227dea87ab00bdcf820a1f08c764bf43d563affc64f68ad400fa917ed72a4d56481d45f725f80248d05ccb2954ff5612f166a33f548463028f3d5fdce15f0d139c9a64b8294ee94b9dab2327f13cffe3632834f1220b890f8e963a3fe61e38bb1ff0a4e364c0b60ed2c3e5fc32aa38a40791480dcfa3700c1e10a6ea86629639fde46ae384e529b0a3f4336f1db53fdbef019993950e56e79d537fe3ff52943faec993c44263ff9c1dbd83b5f64118880eac76ecf7acda06758d1b294a7ee35fec9a20440b11b2d62074a9dd7245d5e399dc137915c274950c43c4a3a797d82dd450fe4b99160ed892a7b6c3d3e0b4dfad63c8505db264950b55fb59755ac045a2e0985035bed44a507eb1c020241ce80a6f7f9d1af4cb57a560d6594a4dc1d3453090faf1af83657ca63286105648d51c733609646c87adbf205071e22b1d8de02942edbbc059d51f55673e91e199bd6b3d6a57f6763bcf09217d6e256b96e3e7edca9d0fb0768bcade57c43210ea902144463142804455c982c89dbf6a925a306ec6e838c41b8ef93ab592ca7ab2d355656e478616dfaf40295785d00950e01d866344380b86cd71f6a472a5807db838d3f76cd090f6c7f18291545acc3a4b2995b4e09e5161b61879a36306c1fb728ab542f541e07571b8898e660a010a1a82b2e2772e243e23da383f7b965e7c4730b3fb37f0c9f1e5f23421046cb0572f0b3b87f90f5d21e339f9b81e081bb13a024326b01f6f064ab693e4dd55d750661d1d46cd22bf1f3276e667746882c6487b60a8e4ccaf884f34b9dbac1ed4a64cabc63c85916ee211d51849c30ef09c37c3b86cdee3a6d694da9ab873ba837acc2b55b51568a445cdc9282a34d2e4bf6c4797da3f839a8477765c5d3efe8f6722bd773b6c3954c924b294bc1d8d057d83c0d39e2b6c9bd69abc4907a6f1c78e4f7dba2d97967f526d5a734158b2cffcc4084287854fc10b0553bc269a80ee3b8da8edb75c3d969fc98bd78ec3fe837031dc619384841e6d8fd6cf6429c59cfbf966e598d7ea7b911975fbe8ac1b49ecf92c2c467775750bdb774a1c2ede2a9e1b00c4784d9bf0661f9385fa1755854865db82187fa5e96397705512f28ceb6badd4228721c1c23536bf507167133bcafa4220866c8f97542b763b8a0f1c30a09a9969ac41fadb781af6eb7dbf8cd3a443a064269a37f5f3fd77d061bf1dcf364f185c08a28dc7f127039c5ad897d76b852b9ae2d01a240beb3eaf717482a4c7f4ace882cbdf16fff11da8e26d8547547395e380afd8b102785503069e48aa935dad03c149ebc660e5f02377a9988b74f97ce802240dc23e6b8ec7d176c449b3d4a1d2ef9735c64cd5e3bb7068ab7b7e6cc1ef2f09ec81ec595c44653e2e90eda0a0a349dc58af9d56ba8c522ea47870415ed53d2eeeba2ad142cd71c8a57c29fa8f8f607e730c428dd21bccc1bf4bd2d6ff083158de82b857a224da44d38fc071fb8062b6c1179f7c1113b819c4886de6532727c9124743fdc03dc67b682d565dad2497a480bdbb2e53b5b7206d8877d14e9491ad1bfcb17a5f17ffea7fe402bf8f286d25f759e92de72fee79dadf0948824f1c28019402a7cae869b0bff84d78927258059f395672d19613d9f748ed436555cd5f6b675624aaf94501323b840049d279120ebad2e790aec6059ed4d2570619e2b4f0b25b4b80a897322d0347a04f31fd6ac8439ff783b90cb46b73b5fb6c7c026321ca3db33230ea7ef8029e3be40d5b586ea5b69eee1861f2439c14ae844eceb6682f3a49afc22343f632b7fe0b8c6cd39e4127754484163498a240324d0704b04f8e019649f8a65daffac98bb4b6546eef7e5c343f20e8d8d853c19cd38f04e6c52e97663b754d7db6c071c4dbfbff0244a360b9f9a8d9e1b555267279f3ac1d299c9932787fd4854b0b9388a5c6e23d9d720c44f0493f456fb849de31a7a8030f5af15972fa227b65367cdd7b1970ddfa46dac2083c4f8cfc8ae28f9928eee79ce354dcbe6ba5201a97e376ad01a7c82ae3725d1028a8d1d4e67f3464607cb107f2b84ab8025de3d4c523fab31ebc707ce1e96ed7eb813f099888733b2212178ed43ecea7053d8f59237852d3ff47e18a11cb5b6c249e6fb64c86341f64ad2409612e0ba1f4a6aa9cd6f9c1b25588aa8cd9153a7d276bcbcf7b2c34d60da07aa5ccacb63d260aea8e4c86e2052c9e4a768c63f551ca6151d92e579b6ad3b040e0cbc7b888a46f1779b5f472302d5b5d86628541f29da3e1e63701d09a192addbc6f84a3877b718f6def5fa601ea622f196c2a6b5e453183d12dd29280d71fb0c045c9ae79da9e12d5302a356ea45e691aaec7026d2b13f6f3c32cdff492e283253e449affceb7b7ba52d89fa430cd7fa55801b882758c12a88279321b4eaeb3c4dc5dd175000318b5d7a60e6cd196641ae1209f7a967c28c2de1db639cf36ce047f89b457419c313757012af59337a140e5471064badf24c84666ddb8a14ea348e0467644b125d0ab3a5cd0168876bbeedc48ceaa77fa358f7f3e0feb950a896cd81495e3146998cf171b7b76d37878ce35c4306f49ea665e3447e36e179fc004b43f96263c396954675a4ba8c63c1ee6976ab5c0ea96a2b38e5488b10ed3c38cc0ac350425d1aa14ae351d6d06ecb92ed3d4d9379da01a21ae119cad06aaa1ad2b027463f492e17eaab99748e5460f2f2c89f8df62b36666a6dd0db4638b2397a2150287baa8dab7759808dbe395272685e83e43d9b07d1cd0d55283405df70c3e8a7a2866fad71e4c1b2f08fd8c4c25d1215e1aa45572d0ffb5d7a604d4a5bf0c4aa399ad11d16f4fbb88cfaaad3104df3191e0a6ce98bc29d6aa43d47ac48495c2057c09daf9ccbbbd13ef50797996cb3d569efd830ac72a7ec14083497ebe9726f0c1086bcf0aa379f11ea805777b5646fc7164437321578a56ad88eb074d0cf46b359cd94399c6972be2b60919d1d00f9bbac4abefa5eaab69a045fa358014a30caa67853389ad5006de49a9509c920b295c6fe1a11540e30b1b0d818285db8a120f42882e66a89026c94b51113e1110543ed5466c0fd636147af92636caf6d5129d3e7a2d1c6b191d2b1fc111862cf407903b9c8f11b9562211f6c15186bb396fa9b5691e5c6c76d74cf56f775336a9d8bf59eacbf4f0de9c0618be5c91ff8f9b28a8b73aa30b25147bf47dff54761eb7debd9415948c1fa02ba22dc26f497a3150985e78eb94b97aeb1144202c864e447af82c838c35edd8628e043e55e49ca266a20638d26d28db92d6e7546fef36a1973d312ead2859a3b0556619f6f50a9e3e1da58aca32728ff9d52a2bec941d592614c1a18a00944fdd3159420a1846445ce0a54729f2bab1f21701d911d8d35d8494ad04a2c7ad3babe8c31638b137ee3dc608a0b830cc59de93864fb85a0bf96be9b8d652ae9c0e4e591b65d56da74680783eaad35a11eeeaa7181cce25ac960d33e13dab70e3da1bfee35de23251f82d61d5b13d46d6b3390eaff0256b84710d49cf8abc6e0923ede7a71ca265ab0ddd523b6966ae9817814c27ed791be85efddc1f1de17008e988072815a16988a66277984b8b2c84eb93b0c954584787be0b11157b59c0f74ccb4908505ea6f066bb75df3adf9754e6c5eeda3a1f7742b756cc24e7289844ced0778c9650aa82c04eb91ea06e58a1295e5d867af93886fb350cb661a490dcb65474a9aec1ae998963010e8e5d471473a046aae01d377ed541dfeb6c6198b40b453b95b07048d9a465e063b7b81cb8cbd3a1503e6c8fbdb95271392a08329769e2c99ac35cbcc54196353d429cf9ca8eb44772fd35d509620b3c67e4958ec3c234d4eca8317132570d92677adafb77c213b55f7ffffd5bbe680f02fb022051e1b0ba9135cbbf7d83b3857826335c94d27f4f08d52dc2c9e9d323ce4b4facc30310b772e2d45e3e859d78092b790a8d24094928ae32956118d20f06aa04d15ea6d26502500f91b72163642f61d7c09834323ab06b86f88fafc09631c43bae336b0f844b6c299f026b600df6c7e24dacc0c35e66d11c7f52618de2ceb32c8e08dccb8c2fe5c46369e7939385a2066e1bc7c7a894c6250ff314818f848ab43b1f7701b474f0d4b9e9d5875808cdd98a7456d23c80059fa6fa60e1a70f10d011c0792149bb4733671dfbd7080bf35c7ab2813f0cf577676a15eb5657d6b7433149a7b01d997d057c296642b07381e75040c5d936be0e7114ceb6ebbaa71a32883723aae6cb983127db897460bfcb2bce7a3085370a598fc7b8d97d6c5bdad4df5ad32b8aa4de42d5094a5211de91a5618bbdba38c4411880e43bc98ea5a4ac6cd4a922eca71ae0949d8e8aa7b043f0db8497b5825537bb9402b47b32feebdfe0f4762be94752c132066d020c0fa872c3c5b4b72761b47811fe00477f2be847eb2724c7eb64183a9515b4e9162e59dfb179ac8d94e0883d4c1174f8a90edf62fdaae700dff8f36d2576ae8a50ca54221911e565dbee947827614091ac3f31561e4954ce6ec2e0a022773929f0477d69813b2ed6a7c4b47fca5252f88d69a09439311705e8abb725f0f378ec64e6240e67b4e9ee6b0da6b484516b362e1cd52aab5b86017ee72e574ab934975f625f36fb441ac50b253817fee13e0aad9ab80db3285cfa100a570655194f1eaabef8c4af5e1f1aae77eab35c471476b9f674206923b082a6d0f5c25ad7f1ce20f980a0243ef85e726c97083c43059d9d92c26442cd454246b820f73917b649e369323864b363b524be651"}) (async) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r10, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (async) connect$inet(r2, &(0x7f0000000580)={0x2, 0x4e22, @remote}, 0x10) (async) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f00000003c0)={0xfffffffe, 0xa87a, 0x4be38e54, {0xffffffe0, 0x7}, 0x7f}) (async) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000500)={&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/20, 0x14, 0x0, &(0x7f0000000440)=""/173, 0xad}, &(0x7f0000000540)=0x40) getsockopt$inet_int(r1, 0x10d, 0xf, 0x0, &(0x7f00000000c0)) 07:19:27 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x3000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xfeffffff00000000}, 0x0) 07:19:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xffffff7f, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 396.865937][T15372] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 396.888721][T15390] loop3: detected capacity change from 0 to 128 07:19:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xffffff7f00000000}, 0x0) 07:19:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file0\x00', 0x14552, &(0x7f0000000080)=ANY=[@ANYBLOB="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", @ANYRES64], 0xfd, 0x11d4, &(0x7f00000024c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[], 0xc1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r0, 0x0) (async) r1 = socket$inet_dccp(0x2, 0x6, 0x0) (async) r2 = socket(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) r5 = socket$inet6(0xa, 0x5, 0x4) (async) r6 = socket(0x10, 0x3, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) getsockname$packet(r8, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r9, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) ioctl$BTRFS_IOC_RM_DEV(r5, 0x5000940b, &(0x7f0000001280)={{r6}, "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"}) getsockname$packet(r4, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r10, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async, rerun: 32) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (async, rerun: 32) connect$inet(r2, &(0x7f0000000580)={0x2, 0x4e22, @remote}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f00000003c0)={0xfffffffe, 0xa87a, 0x4be38e54, {0xffffffe0, 0x7}, 0x7f}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000500)={&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/20, 0x14, 0x0, &(0x7f0000000440)=""/173, 0xad}, &(0x7f0000000540)=0x40) (async) getsockopt$inet_int(r1, 0x10d, 0xf, 0x0, &(0x7f00000000c0)) [ 396.933691][T15390] FAT-fs (loop3): Unrecognized mount option "allow_" or missing value [ 396.957714][T15394] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0xffffffff00000000}, 0x0) 07:19:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0xfffffff0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:27 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x4000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:27 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d30303030303030303030303030303230303030303030302c646f74732c646f74732c6e6f646f74732c6e6f646f74732c6572f5f269cf4de9ebb17469ee75652c646973636172642c00"], 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) [ 397.018549][T15398] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 397.027507][T15411] loop2: detected capacity change from 0 to 8192 [ 397.101892][T15423] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 397.172284][T15428] loop3: detected capacity change from 0 to 128 [ 397.180454][T15428] FAT-fs (loop3): Unrecognized mount option "erőňiĎMéë±tiîue" or missing value [ 397.196078][T15424] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:27 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) r0 = syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0x3, &(0x7f0000000480)={0x1f, 0x100}, &(0x7f00000004c0)) (async) prlimit64(0x0, 0x3, &(0x7f0000000480)={0x1f, 0x100}, &(0x7f00000004c0)) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") (async) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_clone(0x4243180, &(0x7f0000000000)="eb0c735404338f74bd51d5f9af04e43dc6d8c9310fbfc76d9cdd2349bb8aef37bf3d6cda86335aa5c8794e86759351843adbf3dc58e9401d113f78db19c88382e151141c22b34af907c0f3d318b12a41e08b64b3f7a54afd045bbb921724a0b03b5b77e7531b9cfa09a5a9d676a840402ab66dc602b8a805c1fb91c21b1704510277219baa6244b0924c9d8c93c4dad625c23c305f198df1d237c2d1324402592b16d8c8556986ce8c999cc6d6b9182e362e0c6e401f5a3ae70b2dabd9f6b9e81ce07ee81cb1c20bbd19bf3d46fbb920140c99dafa92902e15eba7db04f96ea03d7a7c73ca4901", 0xe7, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)="ef4330119bfbb6270a59acee2842e56b0dbafbd34c9ff6513f233184b11546e91b0c6c0832b31423bc06f678902c075d6c6af0cac29c5c2c8ae46e3417a8ce2e2e280f4156cdc6cc700e1ba845dd482b295e88d1edd2c17a0705e61c9845fdb699df12e38ded9d122a4932024b17fe58213e5530dd5e8d188082d9a8dea8") perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x20, 0x7, 0x7, 0x8, 0x0, 0xffffffff, 0x6e3b04f117a6932c, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0xfffffffeffffffff, 0x7f}, 0x4000, 0x400, 0x1, 0xa, 0xe9d, 0x6, 0x8, 0x0, 0x3, 0x0, 0x4}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r2, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x8, 0x7f, 0x8, 0x0, 0x0, 0x42, 0x1240, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000300), 0x4}, 0x8, 0xb0, 0x6, 0x6, 0x8001, 0x2, 0xa9ff, 0x0, 0x5, 0x0, 0x80}, r1, 0xb, r2, 0x2) 07:19:27 executing program 2: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) r0 = syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0x3, &(0x7f0000000480)={0x1f, 0x100}, &(0x7f00000004c0)) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_clone(0x4243180, &(0x7f0000000000)="eb0c735404338f74bd51d5f9af04e43dc6d8c9310fbfc76d9cdd2349bb8aef37bf3d6cda86335aa5c8794e86759351843adbf3dc58e9401d113f78db19c88382e151141c22b34af907c0f3d318b12a41e08b64b3f7a54afd045bbb921724a0b03b5b77e7531b9cfa09a5a9d676a840402ab66dc602b8a805c1fb91c21b1704510277219baa6244b0924c9d8c93c4dad625c23c305f198df1d237c2d1324402592b16d8c8556986ce8c999cc6d6b9182e362e0c6e401f5a3ae70b2dabd9f6b9e81ce07ee81cb1c20bbd19bf3d46fbb920140c99dafa92902e15eba7db04f96ea03d7a7c73ca4901", 0xe7, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)="ef4330119bfbb6270a59acee2842e56b0dbafbd34c9ff6513f233184b11546e91b0c6c0832b31423bc06f678902c075d6c6af0cac29c5c2c8ae46e3417a8ce2e2e280f4156cdc6cc700e1ba845dd482b295e88d1edd2c17a0705e61c9845fdb699df12e38ded9d122a4932024b17fe58213e5530dd5e8d188082d9a8dea8") perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x20, 0x7, 0x7, 0x8, 0x0, 0xffffffff, 0x6e3b04f117a6932c, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0xfffffffeffffffff, 0x7f}, 0x4000, 0x400, 0x1, 0xa, 0xe9d, 0x6, 0x8, 0x0, 0x3, 0x0, 0x4}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r2, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x8, 0x7f, 0x8, 0x0, 0x0, 0x42, 0x1240, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000300), 0x4}, 0x8, 0xb0, 0x6, 0x6, 0x8001, 0x2, 0xa9ff, 0x0, 0x5, 0x0, 0x80}, r1, 0xb, r2, 0x2) 07:19:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x2}, 0x0) 07:19:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:27 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x5000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:27 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d30303030303030303030303030303230303030303030302c646f74732c646f74732c6e6f646f74732c6e6f646f74732c6572f5f269cf4de9ebb17469ee75652c646973636172642c00"], 0x1, 0x284, &(0x7f0000000500)="$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") (async, rerun: 64) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 07:19:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x4}, 0x0) [ 397.704305][T15441] loop3: detected capacity change from 0 to 128 [ 397.732602][T15455] loop2: detected capacity change from 0 to 128 [ 397.734913][T15441] FAT-fs (loop3): Unrecognized mount option "erőňiĎMéë±tiîue" or missing value 07:19:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x9}, 0x0) 07:19:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xf}, 0x0) [ 397.752724][T15437] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 397.755400][T15448] loop0: detected capacity change from 0 to 128 07:19:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x696}, 0x0) 07:19:27 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x2, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:27 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x6000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x900}, 0x0) 07:19:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYBLOB="29c2124e144e7676e9a3e45c74144ea57b11a1c572dcdbd10caf8f"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) getsockopt(r2, 0xa83, 0x8, &(0x7f0000000140)=""/20, &(0x7f0000000180)=0x14) write$binfmt_script(r2, &(0x7f00000003c0)=ANY=[@ANYRESOCT], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4000004, 0x12, r2, 0x0) getsockopt$bt_hci(r1, 0x11c, 0x2, &(0x7f0000002080)=""/4111, &(0x7f0000000000)=0x100f) 07:19:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x3, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:28 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x7000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xf00}, 0x0) 07:19:28 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d30303030303030303d6c209230303030103030303030302c646f74732c646f74736c6e6f646f74732c6e6f646f74732c65fbff6f72733d636f6e74696e75652c646973636172642c00"], 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = syz_clone(0x40004000, &(0x7f0000000580)="6f87cd963e3e0b7658a51f06a75f8a066cd9abde703e43cdbae4383b372605f5d85ca0a1f6b2259239bf66cf73abd6f6bd5454f867dd7887a16a2b100fc2a4cfc984f6318df2fc44abec5a347fa0747353918a32fec11e44678be496da6a", 0x5e, &(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000600)="3088df20d83036617c3928a440aca158ee7e7b9c78440f0fcf9dca78427c496318069e8a76244db283263cb05ef398f875141ff8d42ce3a22bcc95f99a0a880d3655fbc4c40490941b0f7bb5fe6431d2564ba4c702229ef510bee24f9dcb609f61200354d1099e7ccb6ba459482a2a874ad67eba3e5f96eaa06c4214bcf10ce353f8f2337662285619e61139f882d4109773e1293e09ae75") perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x2, 0x1, 0x0, 0x0, 0x38100, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x3, 0x8}, 0x92380, 0x1, 0x200, 0x5, 0xd07, 0x10000, 0x17f, 0x0, 0xffffffff, 0x0, 0x2}, r1, 0x5, r0, 0x8) ptrace$setopts(0x2103, r1, 0x81, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) r3 = syz_clone(0x40004000, &(0x7f0000000580)="6f87cd963e3e0b7658a51f06a75f8a066cd9abde703e43cdbae4383b372605f5d85ca0a1f6b2259239bf66cf73abd6f6bd5454f867dd7887a16a2b100fc2a4cfc984f6318df2fc44abec5a347fa0747353918a32fec11e44678be496da6a", 0x5e, &(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000600)="3088df20d83036617c3928a440aca158ee7e7b9c78440f0fcf9dca78427c496318069e8a76244db283263cb05ef398f875141ff8d42ce3a22bcc95f99a0a880d3655fbc4c40490941b0f7bb5fe6431d2564ba4c702229ef510bee24f9dcb609f61200354d1099e7ccb6ba459482a2a874ad67eba3e5f96eaa06c4214bcf10ce353f8f2337662285619e61139f882d4109773e1293e09ae75") perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x2, 0x1, 0x0, 0x0, 0x38100, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x3, 0x8}, 0x92380, 0x1, 0x200, 0x5, 0xd07, 0x10000, 0x17f, 0x0, 0xffffffff, 0x0, 0x2}, r3, 0x5, r2, 0x8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000040)) r5 = syz_clone(0x40004000, &(0x7f0000000580)="6f87cd963e3e0b7658a51f06a75f8a066cd9abde703e43cdbae4383b372605f5d85ca0a1f6b2259239bf66cf73abd6f6bd5454f867dd7887a16a2b100fc2a4cfc984f6318df2fc44abec5a347fa0747353918a32fec11e44678be496da6a", 0x5e, &(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000600)="3088df20d83036617c3928a440aca158ee7e7b9c78440f0fcf9dca78427c496318069e8a76244db283263cb05ef398f875141ff8d42ce3a22bcc95f99a0a880d3655fbc4c40490941b0f7bb5fe6431d2564ba4c702229ef510bee24f9dcb609f61200354d1099e7ccb6ba459482a2a874ad67eba3e5f96eaa06c4214bcf10ce353f8f2337662285619e61139f882d4109773e1293e09ae75") perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x2, 0x1, 0x0, 0x0, 0x38100, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x3, 0x8}, 0x92380, 0x1, 0x200, 0x5, 0xd07, 0x10000, 0x17f, 0x0, 0xffffffff, 0x0, 0x2}, r5, 0x5, r4, 0x8) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000000)={&(0x7f0000000280)=""/143, 0x8f}) setpriority(0x2, r5, 0xaab2) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:28 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d30303030303030303030303030303230303030303030302c646f74732c646f74732c6e6f646f74732c6e6f646f74732c6572f5f269cf4de9ebb17469ee75652c646973636172642c00"], 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xffe}, 0x0) 07:19:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x4, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x9606}, 0x0) [ 398.188245][T15550] loop0: detected capacity change from 0 to 128 [ 398.205232][T15550] FAT-fs (loop0): Unrecognized mount option "allow_utime=00000000=l ’0000000000" or missing value [ 398.221968][T15552] loop3: detected capacity change from 0 to 128 07:19:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xfe0f}, 0x0) [ 398.233513][T15552] FAT-fs (loop3): Unrecognized mount option "erőňiĎMéë±tiîue" or missing value 07:19:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x34000}, 0x0) 07:19:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x5, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYBLOB="29c2124e144e7676e9a3e45c74144ea57b11a1c572dcdbd10caf8f"], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) (async, rerun: 32) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) (rerun: 32) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) getsockopt(r2, 0xa83, 0x8, &(0x7f0000000140)=""/20, &(0x7f0000000180)=0x14) write$binfmt_script(r2, &(0x7f00000003c0)=ANY=[@ANYRESOCT], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4000004, 0x12, r2, 0x0) (async) getsockopt$bt_hci(r1, 0x11c, 0x2, &(0x7f0000002080)=""/4111, &(0x7f0000000000)=0x100f) 07:19:28 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x8000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x400300}, 0x0) 07:19:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x1000000}, 0x0) 07:19:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x2000000}, 0x0) 07:19:28 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x6, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:28 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x9000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYRESHEX, @ANYRESOCT, @ANYBLOB="29c2124e144e7676e9a3e45c74144ea57b11a1c572dcdbd10caf8f"], 0x208e24b) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28011, r0, 0x0) (async) preadv(r0, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) (async, rerun: 64) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='freezer.self_freezing\x00', 0x275a, 0x0) (rerun: 64) getsockopt(r2, 0xa83, 0x8, &(0x7f0000000140)=""/20, &(0x7f0000000180)=0x14) (async) write$binfmt_script(r2, &(0x7f00000003c0)=ANY=[@ANYRESOCT], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4000004, 0x12, r2, 0x0) (async) getsockopt$bt_hci(r1, 0x11c, 0x2, &(0x7f0000002080)=""/4111, &(0x7f0000000000)=0x100f) 07:19:28 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async, rerun: 32) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d30303030303030303d6c209230303030103030303030302c646f74732c646f74736c6e6f646f74732c6e6f646f74732c65fbff6f72733d636f6e74696e75652c646973636172642c00"], 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = syz_clone(0x40004000, &(0x7f0000000580)="6f87cd963e3e0b7658a51f06a75f8a066cd9abde703e43cdbae4383b372605f5d85ca0a1f6b2259239bf66cf73abd6f6bd5454f867dd7887a16a2b100fc2a4cfc984f6318df2fc44abec5a347fa0747353918a32fec11e44678be496da6a", 0x5e, &(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000600)="3088df20d83036617c3928a440aca158ee7e7b9c78440f0fcf9dca78427c496318069e8a76244db283263cb05ef398f875141ff8d42ce3a22bcc95f99a0a880d3655fbc4c40490941b0f7bb5fe6431d2564ba4c702229ef510bee24f9dcb609f61200354d1099e7ccb6ba459482a2a874ad67eba3e5f96eaa06c4214bcf10ce353f8f2337662285619e61139f882d4109773e1293e09ae75") perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x2, 0x1, 0x0, 0x0, 0x38100, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x3, 0x8}, 0x92380, 0x1, 0x200, 0x5, 0xd07, 0x10000, 0x17f, 0x0, 0xffffffff, 0x0, 0x2}, r1, 0x5, r0, 0x8) ptrace$setopts(0x2103, r1, 0x81, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) (async) r3 = syz_clone(0x40004000, &(0x7f0000000580)="6f87cd963e3e0b7658a51f06a75f8a066cd9abde703e43cdbae4383b372605f5d85ca0a1f6b2259239bf66cf73abd6f6bd5454f867dd7887a16a2b100fc2a4cfc984f6318df2fc44abec5a347fa0747353918a32fec11e44678be496da6a", 0x5e, &(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000600)="3088df20d83036617c3928a440aca158ee7e7b9c78440f0fcf9dca78427c496318069e8a76244db283263cb05ef398f875141ff8d42ce3a22bcc95f99a0a880d3655fbc4c40490941b0f7bb5fe6431d2564ba4c702229ef510bee24f9dcb609f61200354d1099e7ccb6ba459482a2a874ad67eba3e5f96eaa06c4214bcf10ce353f8f2337662285619e61139f882d4109773e1293e09ae75") perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x2, 0x1, 0x0, 0x0, 0x38100, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x3, 0x8}, 0x92380, 0x1, 0x200, 0x5, 0xd07, 0x10000, 0x17f, 0x0, 0xffffffff, 0x0, 0x2}, r3, 0x5, r2, 0x8) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000040)) r5 = syz_clone(0x40004000, &(0x7f0000000580)="6f87cd963e3e0b7658a51f06a75f8a066cd9abde703e43cdbae4383b372605f5d85ca0a1f6b2259239bf66cf73abd6f6bd5454f867dd7887a16a2b100fc2a4cfc984f6318df2fc44abec5a347fa0747353918a32fec11e44678be496da6a", 0x5e, &(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000600)="3088df20d83036617c3928a440aca158ee7e7b9c78440f0fcf9dca78427c496318069e8a76244db283263cb05ef398f875141ff8d42ce3a22bcc95f99a0a880d3655fbc4c40490941b0f7bb5fe6431d2564ba4c702229ef510bee24f9dcb609f61200354d1099e7ccb6ba459482a2a874ad67eba3e5f96eaa06c4214bcf10ce353f8f2337662285619e61139f882d4109773e1293e09ae75") perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x2, 0x1, 0x0, 0x0, 0x38100, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x3, 0x8}, 0x92380, 0x1, 0x200, 0x5, 0xd07, 0x10000, 0x17f, 0x0, 0xffffffff, 0x0, 0x2}, r5, 0x5, r4, 0x8) (async, rerun: 32) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000000)={&(0x7f0000000280)=""/143, 0x8f}) (rerun: 32) setpriority(0x2, r5, 0xaab2) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:28 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000280)=ANY=[@ANYBLOB="616c6c6f775f30303030303030303030303030303030302c646f74732c646f74732c6e6f646f74636f6e74696575652c646973636172642c00000000000000000000000000e89ffcbe7fb23f5fbc444a0588c0df56e8994d140d3788932c6decde681a79b23aa622d2ba59af49108d629da2683638b26fb236b60689142379c221d762c616f7f56052b50ac120daf6fb29e6872b5769f4fdd707dfed8075c16afee3be1f663a77e8b797f9bcfbb1d2e7c9cf1eed24ae550e5b33460a632c54a3ef056fcbb37d5fc1d26cd58905b5ed29c04b2726d839f15d85a451112113c2a1706ebe96fbb972cf8fa97dc1d860c146c997b30c1d"], 0x1, 0x284, &(0x7f0000000500)="$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") r1 = dup3(r0, r0, 0x80000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x4000000}, 0x0) 07:19:28 executing program 2: prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x0) r0 = syz_clone(0x0, &(0x7f0000000380)="604d454e26929f9ea3aa5359e1a71a67e75950529ba05524dbd143a503ea0997b77d0081a0542a6a2bccedf82cc9df30580d656c15869e63aefa183fad8ddb687d3d357b5f6c5e53cd2d4b1d1731f6e14d5243b1ea90f83bafcd282b2c9bafc3251ccaed5d799ad9bd24365edabee229ebd77e5dc4e2c34b2ec4387f777e77fbf8f212f85e857fda9fafbb13d542f35f98e58a1313f7befde4218035790f9427ad725f20770e1180b0a284c7535598d23b6ddf4dbe6da587034da9d73bd4e23ee5c7ed894b5c5a038d1da291c81ff81985627403dd4434e7d93f9f89f677eec408", 0xe1, 0x0, &(0x7f00000001c0), 0x0) get_robust_list(r0, &(0x7f0000000340)=&(0x7f0000000300)={&(0x7f0000000240), 0x0, &(0x7f00000002c0)}, 0x0) 07:19:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x9000000}, 0x0) 07:19:29 executing program 2: prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x0) (async) r0 = syz_clone(0x0, &(0x7f0000000380)="604d454e26929f9ea3aa5359e1a71a67e75950529ba05524dbd143a503ea0997b77d0081a0542a6a2bccedf82cc9df30580d656c15869e63aefa183fad8ddb687d3d357b5f6c5e53cd2d4b1d1731f6e14d5243b1ea90f83bafcd282b2c9bafc3251ccaed5d799ad9bd24365edabee229ebd77e5dc4e2c34b2ec4387f777e77fbf8f212f85e857fda9fafbb13d542f35f98e58a1313f7befde4218035790f9427ad725f20770e1180b0a284c7535598d23b6ddf4dbe6da587034da9d73bd4e23ee5c7ed894b5c5a038d1da291c81ff81985627403dd4434e7d93f9f89f677eec408", 0xe1, 0x0, &(0x7f00000001c0), 0x0) get_robust_list(r0, &(0x7f0000000340)=&(0x7f0000000300)={&(0x7f0000000240), 0x0, &(0x7f00000002c0)}, 0x0) 07:19:29 executing program 2: prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x0) r0 = syz_clone(0x0, &(0x7f0000000380)="604d454e26929f9ea3aa5359e1a71a67e75950529ba05524dbd143a503ea0997b77d0081a0542a6a2bccedf82cc9df30580d656c15869e63aefa183fad8ddb687d3d357b5f6c5e53cd2d4b1d1731f6e14d5243b1ea90f83bafcd282b2c9bafc3251ccaed5d799ad9bd24365edabee229ebd77e5dc4e2c34b2ec4387f777e77fbf8f212f85e857fda9fafbb13d542f35f98e58a1313f7befde4218035790f9427ad725f20770e1180b0a284c7535598d23b6ddf4dbe6da587034da9d73bd4e23ee5c7ed894b5c5a038d1da291c81ff81985627403dd4434e7d93f9f89f677eec408", 0xe1, 0x0, &(0x7f00000001c0), 0x0) get_robust_list(r0, &(0x7f0000000340)=&(0x7f0000000300)={&(0x7f0000000240), 0x0, &(0x7f00000002c0)}, 0x0) (async) get_robust_list(r0, &(0x7f0000000340)=&(0x7f0000000300)={&(0x7f0000000240), 0x0, &(0x7f00000002c0)}, 0x0) [ 398.875744][T15603] loop3: detected capacity change from 0 to 128 [ 398.896327][T15603] FAT-fs (loop3): Unrecognized mount option "allow_00000000000000000" or missing value [ 398.914692][T15599] loop0: detected capacity change from 0 to 128 07:19:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xf000000}, 0x0) 07:19:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x7, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x96060000}, 0x0) 07:19:29 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xa000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 398.922379][T15599] FAT-fs (loop0): Unrecognized mount option "allow_utime=00000000=l ’0000000000" or missing value 07:19:29 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d30303030303030303d6c209230303030103030303030302c646f74732c646f74736c6e6f646f74732c6e6f646f74732c65fbff6f72733d636f6e74696e75652c646973636172642c00"], 0x1, 0x284, &(0x7f0000000500)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) (async) r1 = syz_clone(0x40004000, &(0x7f0000000580)="6f87cd963e3e0b7658a51f06a75f8a066cd9abde703e43cdbae4383b372605f5d85ca0a1f6b2259239bf66cf73abd6f6bd5454f867dd7887a16a2b100fc2a4cfc984f6318df2fc44abec5a347fa0747353918a32fec11e44678be496da6a", 0x5e, &(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000600)="3088df20d83036617c3928a440aca158ee7e7b9c78440f0fcf9dca78427c496318069e8a76244db283263cb05ef398f875141ff8d42ce3a22bcc95f99a0a880d3655fbc4c40490941b0f7bb5fe6431d2564ba4c702229ef510bee24f9dcb609f61200354d1099e7ccb6ba459482a2a874ad67eba3e5f96eaa06c4214bcf10ce353f8f2337662285619e61139f882d4109773e1293e09ae75") perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x2, 0x1, 0x0, 0x0, 0x38100, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x3, 0x8}, 0x92380, 0x1, 0x200, 0x5, 0xd07, 0x10000, 0x17f, 0x0, 0xffffffff, 0x0, 0x2}, r1, 0x5, r0, 0x8) ptrace$setopts(0x2103, r1, 0x81, 0x18) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) (async) r3 = syz_clone(0x40004000, &(0x7f0000000580)="6f87cd963e3e0b7658a51f06a75f8a066cd9abde703e43cdbae4383b372605f5d85ca0a1f6b2259239bf66cf73abd6f6bd5454f867dd7887a16a2b100fc2a4cfc984f6318df2fc44abec5a347fa0747353918a32fec11e44678be496da6a", 0x5e, &(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000600)="3088df20d83036617c3928a440aca158ee7e7b9c78440f0fcf9dca78427c496318069e8a76244db283263cb05ef398f875141ff8d42ce3a22bcc95f99a0a880d3655fbc4c40490941b0f7bb5fe6431d2564ba4c702229ef510bee24f9dcb609f61200354d1099e7ccb6ba459482a2a874ad67eba3e5f96eaa06c4214bcf10ce353f8f2337662285619e61139f882d4109773e1293e09ae75") perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x2, 0x1, 0x0, 0x0, 0x38100, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x3, 0x8}, 0x92380, 0x1, 0x200, 0x5, 0xd07, 0x10000, 0x17f, 0x0, 0xffffffff, 0x0, 0x2}, r3, 0x5, r2, 0x8) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000040)) (async) r5 = syz_clone(0x40004000, &(0x7f0000000580)="6f87cd963e3e0b7658a51f06a75f8a066cd9abde703e43cdbae4383b372605f5d85ca0a1f6b2259239bf66cf73abd6f6bd5454f867dd7887a16a2b100fc2a4cfc984f6318df2fc44abec5a347fa0747353918a32fec11e44678be496da6a", 0x5e, &(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000600)="3088df20d83036617c3928a440aca158ee7e7b9c78440f0fcf9dca78427c496318069e8a76244db283263cb05ef398f875141ff8d42ce3a22bcc95f99a0a880d3655fbc4c40490941b0f7bb5fe6431d2564ba4c702229ef510bee24f9dcb609f61200354d1099e7ccb6ba459482a2a874ad67eba3e5f96eaa06c4214bcf10ce353f8f2337662285619e61139f882d4109773e1293e09ae75") perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x3, 0x0, 0x2, 0x1, 0x0, 0x0, 0x38100, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x3, 0x8}, 0x92380, 0x1, 0x200, 0x5, 0xd07, 0x10000, 0x17f, 0x0, 0xffffffff, 0x0, 0x2}, r5, 0x5, r4, 0x8) (async) ptrace$getregset(0x4204, r3, 0x202, &(0x7f0000000000)={&(0x7f0000000280)=""/143, 0x8f}) (async) setpriority(0x2, r5, 0xaab2) (async, rerun: 64) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 07:19:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xeaffffff}, 0x0) 07:19:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x8, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:29 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xb000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:29 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000280)=ANY=[@ANYBLOB="616c6c6f775f30303030303030303030303030303030302c646f74732c646f74732c6e6f646f74636f6e74696575652c646973636172642c00000000000000000000000000e89ffcbe7fb23f5fbc444a0588c0df56e8994d140d3788932c6decde681a79b23aa622d2ba59af49108d629da2683638b26fb236b60689142379c221d762c616f7f56052b50ac120daf6fb29e6872b5769f4fdd707dfed8075c16afee3be1f663a77e8b797f9bcfbb1d2e7c9cf1eed24ae550e5b33460a632c54a3ef056fcbb37d5fc1d26cd58905b5ed29c04b2726d839f15d85a451112113c2a1706ebe96fbb972cf8fa97dc1d860c146c997b30c1d"], 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") r1 = dup3(r0, r0, 0x80000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x3, 0x3, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r5, 0x1, 0x70bd29, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x8000003}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1000000}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x68}}, 0x40) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r9, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r10, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) bind$packet(r6, &(0x7f0000000300)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@gettclass={0x24, 0x2a, 0x400, 0x70bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x4, 0x6}, {0xfff2, 0x4}, {0x8, 0x1}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r11 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x701081, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="7cae669299d6c5b0f10e040180ffffffffffffe2cce8d75722f6bec6dbd60000009955ae90dd1377cc7234fa585f75dfc7229a937c843a77b4b774ec1612238fd20f2b326fa85d3ff30dc7f4834e7f0ec68227ca", @ANYRES16=r5, @ANYBLOB="010029bd7000000000000100000005001400200000000c000f00040000000000000005002200010000000c0010000100000000000000060002000100000006001b004e20000008001700", @ANYRES32=r11, @ANYBLOB="080009000000000008000a00010000000500070003000000"], 0x6c}}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r14 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r12, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r14, 0x1, 0x70bd29, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x8000003}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r13}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1000000}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x68}}, 0x40) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x701081, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="010028bd7000fedbdf25020000000500050001fe00000c00040081000000"], 0x24}}, 0x20044841) r15 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$nl_route(r16, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_delrule={0x4c, 0x21, 0x1, 0x70bd2b, 0x25dfdbfe, {0xa, 0x10, 0x10, 0x5, 0x8, 0x0, 0x0, 0x2, 0x4}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'team_slave_0\x00'}, @FRA_DST={0x14, 0x1, @empty}, @FIB_RULE_POLICY=@FRA_FWMASK={0x8, 0x10, 0x7}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x8040) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000580)={0x18, r15, 0xffffffffffffffff, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) 07:19:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xf0ffffff}, 0x0) 07:19:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xfe0f0000}, 0x0) [ 399.830773][T15643] loop0: detected capacity change from 0 to 128 [ 399.849688][T15635] loop3: detected capacity change from 0 to 128 [ 399.863100][T15643] FAT-fs (loop0): Unrecognized mount option "allow_utime=00000000=l ’0000000000" or missing value 07:19:29 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x9, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:30 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xc000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 399.879192][T15635] FAT-fs (loop3): Unrecognized mount option "allow_00000000000000000" or missing value 07:19:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xfeffffff}, 0x0) 07:19:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0xa, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:30 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c036f775f952efa002d0859323030303030303030303030303030303030303030302c6438154047646f74732c6e09646f7473020072726f72733d636f6f74696e75652c00000000000000b1b299deb30002000000000000007444a5d518dd7d0da7bac4f22e21ee3976d706389aa6578e887b64071cd8594277f47d581ef1013f7661a8b25d761e025465aba719bbf9b9b03b94d4802fdfb872849dc1595e7a6c1a34d5b39e84fd6254b885d2fd7476bc8dde4127bf06fe466fe46b3cc27da6a4ea00500ef8fb4d05bb0fa48b4719e1d7a8bfeac5886e0dba4b32"], 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xffffff7f}, 0x0) 07:19:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0xb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:30 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xf000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) socketpair(0x3, 0x3, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r5, 0x1, 0x70bd29, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x8000003}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1000000}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x68}}, 0x40) (async, rerun: 32) r6 = socket$packet(0x11, 0x3, 0x300) (async, rerun: 32) r7 = socket(0x10, 0x3, 0x0) (async, rerun: 32) r8 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 32) r9 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) getsockname$packet(r9, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r10, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (async) bind$packet(r6, &(0x7f0000000300)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) (async) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@gettclass={0x24, 0x2a, 0x400, 0x70bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x4, 0x6}, {0xfff2, 0x4}, {0x8, 0x1}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) (async) r11 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x701081, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="7cae669299d6c5b0f10e040180ffffffffffffe2cce8d75722f6bec6dbd60000009955ae90dd1377cc7234fa585f75dfc7229a937c843a77b4b774ec1612238fd20f2b326fa85d3ff30dc7f4834e7f0ec68227ca", @ANYRES16=r5, @ANYBLOB="010029bd7000000000000100000005001400200000000c000f00040000000000000005002200010000000c0010000100000000000000060002000100000006001b004e20000008001700", @ANYRES32=r11, @ANYBLOB="080009000000000008000a00010000000500070003000000"], 0x6c}}, 0x40) (async, rerun: 32) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r12 = socket$nl_generic(0x10, 0x3, 0x10) (async) r13 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) r14 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r12, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r14, 0x1, 0x70bd29, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x8000003}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r13}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1000000}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x68}}, 0x40) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x701081, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="010028bd7000fedbdf25020000000500050001fe00000c00040081000000"], 0x24}}, 0x20044841) r15 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) (async) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$nl_route(r16, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_delrule={0x4c, 0x21, 0x1, 0x70bd2b, 0x25dfdbfe, {0xa, 0x10, 0x10, 0x5, 0x8, 0x0, 0x0, 0x2, 0x4}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'team_slave_0\x00'}, @FRA_DST={0x14, 0x1, @empty}, @FIB_RULE_POLICY=@FRA_FWMASK={0x8, 0x10, 0x7}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x8040) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000580)={0x18, r15, 0xffffffffffffffff, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) 07:19:30 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r0 = syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000280)=ANY=[@ANYBLOB="616c6c6f775f30303030303030303030303030303030302c646f74732c646f74732c6e6f646f74636f6e74696575652c646973636172642c00000000000000000000000000e89ffcbe7fb23f5fbc444a0588c0df56e8994d140d3788932c6decde681a79b23aa622d2ba59af49108d629da2683638b26fb236b60689142379c221d762c616f7f56052b50ac120daf6fb29e6872b5769f4fdd707dfed8075c16afee3be1f663a77e8b797f9bcfbb1d2e7c9cf1eed24ae550e5b33460a632c54a3ef056fcbb37d5fc1d26cd58905b5ed29c04b2726d839f15d85a451112113c2a1706ebe96fbb972cf8fa97dc1d860c146c997b30c1d"], 0x1, 0x284, &(0x7f0000000500)="$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") (rerun: 64) r1 = dup3(r0, r0, 0x80000) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xffffffea}, 0x0) 07:19:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0xc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xfffffff0}, 0x0) [ 400.657273][T15675] loop3: detected capacity change from 0 to 128 07:19:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xfffffffe}, 0x0) 07:19:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) socketpair(0x3, 0x3, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r5, 0x1, 0x70bd29, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x8000003}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r4}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1000000}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x68}}, 0x40) r6 = socket$packet(0x11, 0x3, 0x300) (async) r7 = socket(0x10, 0x3, 0x0) (async) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) getsockname$packet(r9, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r10, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (async) bind$packet(r6, &(0x7f0000000300)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) (async) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@gettclass={0x24, 0x2a, 0x400, 0x70bd2a, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0x4, 0x6}, {0xfff2, 0x4}, {0x8, 0x1}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r11 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x701081, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="7cae669299d6c5b0f10e040180ffffffffffffe2cce8d75722f6bec6dbd60000009955ae90dd1377cc7234fa585f75dfc7229a937c843a77b4b774ec1612238fd20f2b326fa85d3ff30dc7f4834e7f0ec68227ca", @ANYRES16=r5, @ANYBLOB="010029bd7000000000000100000005001400200000000c000f00040000000000000005002200010000000c0010000100000000000000060002000100000006001b004e20000008001700", @ANYRES32=r11, @ANYBLOB="080009000000000008000a00010000000500070003000000"], 0x6c}}, 0x40) socket$nl_generic(0x10, 0x3, 0x10) (async) r12 = socket$nl_generic(0x10, 0x3, 0x10) (async) r13 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) r14 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r12, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r14, 0x1, 0x70bd29, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8, 0xb, 0x8000003}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}, @L2TP_ATTR_FD={0x8, 0x17, @udp6=r13}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1000000}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x68}}, 0x40) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000540), 0x701081, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000600)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="010028bd7000fedbdf25020000000500050001fe00000c00040081000000"], 0x24}}, 0x20044841) (async) r15 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000340)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$nl_route(r16, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_delrule={0x4c, 0x21, 0x1, 0x70bd2b, 0x25dfdbfe, {0xa, 0x10, 0x10, 0x5, 0x8, 0x0, 0x0, 0x2, 0x4}, [@FIB_RULE_POLICY=@FRA_IIFNAME={0x14, 0x3, 'team_slave_0\x00'}, @FRA_DST={0x14, 0x1, @empty}, @FIB_RULE_POLICY=@FRA_FWMASK={0x8, 0x10, 0x7}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x8040) (async) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000580)={0x18, r15, 0xffffffffffffffff, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x4}]}, 0x18}}, 0x0) 07:19:30 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x10000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 400.713885][T15675] FAT-fs (loop3): Unrecognized mount option "allow_00000000000000000" or missing value [ 400.736136][T15693] loop0: detected capacity change from 0 to 128 [ 400.826124][T15693] FAT-fs (loop0): Unrecognized mount option "alow_•.ú" or missing value 07:19:31 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c036f775f952efa002d0859323030303030303030303030303030303030303030302c6438154047646f74732c6e09646f7473020072726f72733d636f6f74696e75652c00000000000000b1b299deb30002000000000000007444a5d518dd7d0da7bac4f22e21ee3976d706389aa6578e887b64071cd8594277f47d581ef1013f7661a8b25d761e025465aba719bbf9b9b03b94d4802fdfb872849dc1595e7a6c1a34d5b39e84fd6254b885d2fd7476bc8dde4127bf06fe466fe46b3cc27da6a4ea00500ef8fb4d05bb0fa48b4719e1d7a8bfeac5886e0dba4b32"], 0x1, 0x284, &(0x7f0000000500)="$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") (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0xd, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x40030000000000}, 0x0) 07:19:31 executing program 2: prctl$PR_SET_UNALIGN(0x6, 0x1) creat(&(0x7f0000000000)='./file0/file0\x00', 0x104) r0 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r4, 0xf507, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRESOCT=r4, @ANYRES64=r2, @ANYRESHEX=r2, @ANYBLOB="49cc755111f9d418be8164e901442e1f491bf03298364c79f9bf8740add4576924a4a2a05e79d8efe424cab7d23c95862aa2aaf11db848c939e8e26b5bf0d6a35b8596e0bdd9fed8ac28ff448081d52ab578e29e503debadd0a34850a0514d0cc1f3f29d8d8a0bb8e8f0b462b1d9969915ed4f798dd05892376371000e4e5e67cb47"], 0x3c}, 0x1, 0x0, 0x0, 0x20044091}, 0x4) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x1405, 0x1, 0x70bd28, 0x25dfdbfe, "", [{{0x8, 0x1, 0x1}, {0x8, 0x3, 0x3}}, {{0x8, 0x1, 0x1}, {0x8}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x20008051) 07:19:31 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x11000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 401.014425][T15722] loop0: detected capacity change from 0 to 128 [ 401.021825][T15722] FAT-fs (loop0): Unrecognized mount option "alow_•.ú" or missing value 07:19:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x100000000000000}, 0x0) 07:19:31 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x10002800, &(0x7f00000000c0)="54585352ab81ec776a7831f2c4b1dea59909f9941520f86075f71fcdc7a7ca18c03c1620c800278475b552d4501c2616d5c0b6171f34257ef4b30a7c983c2dae56792bbf5f34b5f195258734466f4601cbf3223176d7ba54c497581da68fc65af69436c0e2537ea1ee5a7eb2a877aef58d208395e26e4eaf0653e54946f0539738dc4d592ceb437402ea7709ec3cffe82ed06b87dd09436763a0cf65711cf28a0b135abb3801579bd531b68d3bebf30932173df3badbb7a62f56a2400817bd58dcc3accb9710187bbb496b446e82fdf24d91c5af9b0aed96ce9ad69fd855525ed64739", 0xe3, &(0x7f00000001c0), &(0x7f0000000280), &(0x7f00000002c0)="2f6508aca15d02e9e78dc7683d764fa8a4ff1b3db85eee9d0ee087599d5eb1730729") pidfd_open(r0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d3030303030303030f6e23030303030303030303030303030302c646f74732c646f74732c6e6f646f74732c6e6f646f74732c6572726f72733d636f6e74696e75652c646973636172642c00"], 0x1, 0x284, &(0x7f0000000500)="$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") r1 = gettid() tkill(r1, 0x35) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) getpgid(r2) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0xe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:31 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x13000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:31 executing program 2: prctl$PR_SET_UNALIGN(0x6, 0x1) (async) prctl$PR_SET_UNALIGN(0x6, 0x1) creat(&(0x7f0000000000)='./file0/file0\x00', 0x104) r0 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r4, 0xf507, 0x0) (async) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r4, 0xf507, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) socket(0x10, 0x803, 0x0) (async) r7 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRESOCT=r4, @ANYRES64=r2, @ANYRESHEX=r2, @ANYBLOB="49cc755111f9d418be8164e901442e1f491bf03298364c79f9bf8740add4576924a4a2a05e79d8efe424cab7d23c95862aa2aaf11db848c939e8e26b5bf0d6a35b8596e0bdd9fed8ac28ff448081d52ab578e29e503debadd0a34850a0514d0cc1f3f29d8d8a0bb8e8f0b462b1d9969915ed4f798dd05892376371000e4e5e67cb47"], 0x3c}, 0x1, 0x0, 0x0, 0x20044091}, 0x4) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x1405, 0x1, 0x70bd28, 0x25dfdbfe, "", [{{0x8, 0x1, 0x1}, {0x8, 0x3, 0x3}}, {{0x8, 0x1, 0x1}, {0x8}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x20008051) 07:19:31 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c036f775f952efa002d0859323030303030303030303030303030303030303030302c6438154047646f74732c6e09646f7473020072726f72733d636f6f74696e75652c00000000000000b1b299deb30002000000000000007444a5d518dd7d0da7bac4f22e21ee3976d706389aa6578e887b64071cd8594277f47d581ef1013f7661a8b25d761e025465aba719bbf9b9b03b94d4802fdfb872849dc1595e7a6c1a34d5b39e84fd6254b885d2fd7476bc8dde4127bf06fe466fe46b3cc27da6a4ea00500ef8fb4d05bb0fa48b4719e1d7a8bfeac5886e0dba4b32"], 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c036f775f952efa002d0859323030303030303030303030303030303030303030302c6438154047646f74732c6e09646f7473020072726f72733d636f6f74696e75652c00000000000000b1b299deb30002000000000000007444a5d518dd7d0da7bac4f22e21ee3976d706389aa6578e887b64071cd8594277f47d581ef1013f7661a8b25d761e025465aba719bbf9b9b03b94d4802fdfb872849dc1595e7a6c1a34d5b39e84fd6254b885d2fd7476bc8dde4127bf06fe466fe46b3cc27da6a4ea00500ef8fb4d05bb0fa48b4719e1d7a8bfeac5886e0dba4b32"], 0x1, 0x284, &(0x7f0000000500)="$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") (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 07:19:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x200000000000000}, 0x0) 07:19:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x400000000000000}, 0x0) [ 401.522597][T15739] __nla_validate_parse: 27 callbacks suppressed [ 401.522610][T15739] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 401.550233][T15735] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x900000000000000}, 0x0) 07:19:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0xf, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 401.584267][T15737] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 401.587973][T15749] loop3: detected capacity change from 0 to 128 [ 401.595850][T15750] loop0: detected capacity change from 0 to 128 [ 401.605645][T15749] FAT-fs (loop3): Unrecognized mount option "allow_utime=00000000öâ000000000000000" or missing value 07:19:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xf00000000000000}, 0x0) 07:19:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x9606000000000000}, 0x0) 07:19:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xeaffffff00000000}, 0x0) [ 401.627629][T15750] FAT-fs (loop0): Unrecognized mount option "alow_•.ú" or missing value [ 401.637455][T15738] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 401.708432][T15755] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:32 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async, rerun: 64) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r0 = syz_clone(0x10002800, &(0x7f00000000c0)="54585352ab81ec776a7831f2c4b1dea59909f9941520f86075f71fcdc7a7ca18c03c1620c800278475b552d4501c2616d5c0b6171f34257ef4b30a7c983c2dae56792bbf5f34b5f195258734466f4601cbf3223176d7ba54c497581da68fc65af69436c0e2537ea1ee5a7eb2a877aef58d208395e26e4eaf0653e54946f0539738dc4d592ceb437402ea7709ec3cffe82ed06b87dd09436763a0cf65711cf28a0b135abb3801579bd531b68d3bebf30932173df3badbb7a62f56a2400817bd58dcc3accb9710187bbb496b446e82fdf24d91c5af9b0aed96ce9ad69fd855525ed64739", 0xe3, &(0x7f00000001c0), &(0x7f0000000280), &(0x7f00000002c0)="2f6508aca15d02e9e78dc7683d764fa8a4ff1b3db85eee9d0ee087599d5eb1730729") pidfd_open(r0, 0x0) (async, rerun: 64) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d3030303030303030f6e23030303030303030303030303030302c646f74732c646f74732c6e6f646f74732c6e6f646f74732c6572726f72733d636f6e74696e75652c646973636172642c00"], 0x1, 0x284, &(0x7f0000000500)="$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") (async, rerun: 64) r1 = gettid() tkill(r1, 0x35) (async, rerun: 64) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) (rerun: 64) getpgid(r2) (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 07:19:32 executing program 2: prctl$PR_SET_UNALIGN(0x6, 0x1) creat(&(0x7f0000000000)='./file0/file0\x00', 0x104) r0 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) (async) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) (async) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) socket(0x10, 0x3, 0x0) (async) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) (async) getsockname$packet(r5, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r4, 0xf507, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (async) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRESOCT=r4, @ANYRES64=r2, @ANYRESHEX=r2, @ANYBLOB="49cc755111f9d418be8164e901442e1f491bf03298364c79f9bf8740add4576924a4a2a05e79d8efe424cab7d23c95862aa2aaf11db848c939e8e26b5bf0d6a35b8596e0bdd9fed8ac28ff448081d52ab578e29e503debadd0a34850a0514d0cc1f3f29d8d8a0bb8e8f0b462b1d9969915ed4f798dd05892376371000e4e5e67cb47"], 0x3c}, 0x1, 0x0, 0x0, 0x20044091}, 0x4) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (async) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x1405, 0x1, 0x70bd28, 0x25dfdbfe, "", [{{0x8, 0x1, 0x1}, {0x8, 0x3, 0x3}}, {{0x8, 0x1, 0x1}, {0x8}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x20008051) 07:19:32 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x10, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:32 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x38000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:32 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x2204260, &(0x7f0000000100)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x9}}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="680000006900000329bd7000fbdbdf2500000000000000000800010000000000080001000100000008000100010000000800010002000000080100000200000008000100010000000800010000000000080001000100000008000100020000e20800010001000100"], 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000bdf000/0x4000)=nil, 0x4000, 0x2000000, 0x10, r0, 0x407c0000) 07:19:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xfe0f000000000000}, 0x0) 07:19:32 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x10002800, &(0x7f00000000c0)="54585352ab81ec776a7831f2c4b1dea59909f9941520f86075f71fcdc7a7ca18c03c1620c800278475b552d4501c2616d5c0b6171f34257ef4b30a7c983c2dae56792bbf5f34b5f195258734466f4601cbf3223176d7ba54c497581da68fc65af69436c0e2537ea1ee5a7eb2a877aef58d208395e26e4eaf0653e54946f0539738dc4d592ceb437402ea7709ec3cffe82ed06b87dd09436763a0cf65711cf28a0b135abb3801579bd531b68d3bebf30932173df3badbb7a62f56a2400817bd58dcc3accb9710187bbb496b446e82fdf24d91c5af9b0aed96ce9ad69fd855525ed64739", 0xe3, &(0x7f00000001c0), &(0x7f0000000280), &(0x7f00000002c0)="2f6508aca15d02e9e78dc7683d764fa8a4ff1b3db85eee9d0ee087599d5eb1730729") pidfd_open(r0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d3030303030303030f6e23030303030303030303030303030302c646f74732c646f74732c6e6f646f74732c6e6f646f74732c6572726f72733d636f6e74696e75652c646973636172642c00"], 0x1, 0x284, &(0x7f0000000500)="$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") (async) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d3030303030303030f6e23030303030303030303030303030302c646f74732c646f74732c6e6f646f74732c6e6f646f74732c6572726f72733d636f6e74696e75652c646973636172642c00"], 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") r1 = gettid() tkill(r1, 0x35) (async) tkill(r1, 0x35) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) getpgid(r2) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) [ 402.492711][T15769] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 402.531996][T15771] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:32 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x11, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xfeffffff00000000}, 0x0) 07:19:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 402.541692][T15774] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 402.563505][T15788] loop0: detected capacity change from 0 to 128 [ 402.576677][ T26] audit: type=1400 audit(1688887172.676:407): avc: denied { remount } for pid=15773 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 402.588951][T15794] loop3: detected capacity change from 0 to 128 [ 402.606794][T15794] FAT-fs (loop3): Unrecognized mount option "allow_utime=00000000öâ000000000000000" or missing value [ 402.619357][ T26] audit: type=1400 audit(1688887172.716:408): avc: denied { map } for pid=15773 comm="syz-executor.0" path="socket:[65509]" dev="sockfs" ino=65509 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 07:19:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0xffffffff00000000}, 0x0) [ 402.642856][ T26] audit: type=1400 audit(1688887172.716:409): avc: denied { read } for pid=15773 comm="syz-executor.0" path="socket:[65509]" dev="sockfs" ino=65509 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 07:19:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) 07:19:32 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x12, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:32 executing program 2: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x2, 0x2, 0x85}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r1}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000008c0)={r1, &(0x7f0000000780), &(0x7f0000000880)=""/25}, 0x20) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000180)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeef, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x18, 0x2, 0xc3, 0x85, 0x0, 0xffffffffffffffff, 0x2000, '\x00', 0x0, r0}, 0x48) syz_clone(0x4200100, &(0x7f0000000340)="936a87ba5683d350799c545cd6dc951f08133fe45a91ffbeed2a747955d96adf28a2bad3c1b2fd8a1816798ec7968a8fbbbe980721b6e11d8f3f75628e067973691d82ee6194e37af2101af32683d91a8c3f933fa6c96f874d91ea9618d7216aa69323f0ae82871c34f86586e3c6d68c15c301dba6ae8ac63560813b24e33d67e27d4b663a4f099b473e8bb336720e9bd55ed820acba6ec5f0289ac6ec9942c6864d710f9b82d323afccb05f2a117a001a6824121fb0ea66d01747f95724601ea395ba136974a01096bf0902a529055b3f77f47558f69548cd9da5fd8c6fb9c13d4d640f7f279bf25dbb165f9109", 0xee, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="ae471b87616013d63fac4df712b4eff6ab20947c8d5d1f0c2563225be4b533bc635a9f2176a05e3a18232755f46992c33b0bd687dc602c8831955b0a2d5165c1edb89759ea2907609de1d6512499d66c836209619bad88dc1c642e4a6f127e61d6fc6d0f658af33c97921a331893d7b4a035a4649a2c4416da9566642f6745668aac7a94112b5484d5ff797c1e94979d5d2e5b4fe64ed09f3cc4901b6ca23c1ee45f55fb1c3a7d3fa6f9d6540a0d38d8f577561783b430d4d4d9d79f331b32df0f6789bf61c56165bc765d05bc98eea5b3e4ac3262ef7753a2bbe89c7f9e4b9dd0f48be2d21d77cb23ef619cdae3cd899702c2bff68e5df790f688") creat(&(0x7f0000000240)='./file0\x00', 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x3, @none}, 0xe) r2 = syz_io_uring_complete(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1b, 0x8, 0x1, 0x3, 0x800, r2, 0xffff2f86, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x48) 07:19:32 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x60000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x2}, 0x0) [ 402.688429][T15792] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 402.698182][T15769] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 07:19:32 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x25, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:32 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async, rerun: 64) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x2204260, &(0x7f0000000100)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x9}}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="680000006900000329bd7000fbdbdf2500000000000000000800010000000000080001000100000008000100010000000800010002000000080100000200000008000100010000000800010000000000080001000100000008000100020000e20800010001000100"], 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000bdf000/0x4000)=nil, 0x4000, 0x2000000, 0x10, r0, 0x407c0000) 07:19:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) 07:19:32 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616cb475bac3a813f7ced26c6f775f7574696d653d30303030303030303030303030303030303030303030302c646f74732c646f74732c6e6f646f74732c6e6f646f74732c6572726f72733d636f6e74696e75e1006e6f646f74732c00"], 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:32 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async, rerun: 64) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x2204260, &(0x7f0000000100)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x9}}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="680000006900000329bd7000fbdbdf2500000000000000000800010000000000080001000100000008000100010000000800010002000000080100000200000008000100010000000800010000000000080001000100000008000100020000e20800010001000100"], 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000bdf000/0x4000)=nil, 0x4000, 0x2000000, 0x10, r0, 0x407c0000) 07:19:32 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x65580000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:32 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x2e, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x9}, 0x0) 07:19:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x48, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 402.892032][T15831] loop0: detected capacity change from 0 to 128 07:19:33 executing program 2: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x2, 0x2, 0x85}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r1}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000008c0)={r1, &(0x7f0000000780), &(0x7f0000000880)=""/25}, 0x20) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000180)) (async, rerun: 32) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeef, 0x8031, 0xffffffffffffffff, 0x0) (rerun: 32) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x18, 0x2, 0xc3, 0x85, 0x0, 0xffffffffffffffff, 0x2000, '\x00', 0x0, r0}, 0x48) (async, rerun: 64) syz_clone(0x4200100, &(0x7f0000000340)="936a87ba5683d350799c545cd6dc951f08133fe45a91ffbeed2a747955d96adf28a2bad3c1b2fd8a1816798ec7968a8fbbbe980721b6e11d8f3f75628e067973691d82ee6194e37af2101af32683d91a8c3f933fa6c96f874d91ea9618d7216aa69323f0ae82871c34f86586e3c6d68c15c301dba6ae8ac63560813b24e33d67e27d4b663a4f099b473e8bb336720e9bd55ed820acba6ec5f0289ac6ec9942c6864d710f9b82d323afccb05f2a117a001a6824121fb0ea66d01747f95724601ea395ba136974a01096bf0902a529055b3f77f47558f69548cd9da5fd8c6fb9c13d4d640f7f279bf25dbb165f9109", 0xee, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="ae471b87616013d63fac4df712b4eff6ab20947c8d5d1f0c2563225be4b533bc635a9f2176a05e3a18232755f46992c33b0bd687dc602c8831955b0a2d5165c1edb89759ea2907609de1d6512499d66c836209619bad88dc1c642e4a6f127e61d6fc6d0f658af33c97921a331893d7b4a035a4649a2c4416da9566642f6745668aac7a94112b5484d5ff797c1e94979d5d2e5b4fe64ed09f3cc4901b6ca23c1ee45f55fb1c3a7d3fa6f9d6540a0d38d8f577561783b430d4d4d9d79f331b32df0f6789bf61c56165bc765d05bc98eea5b3e4ac3262ef7753a2bbe89c7f9e4b9dd0f48be2d21d77cb23ef619cdae3cd899702c2bff68e5df790f688") (async) creat(&(0x7f0000000240)='./file0\x00', 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) (async) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x3, @none}, 0xe) (async) r2 = syz_io_uring_complete(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1b, 0x8, 0x1, 0x3, 0x800, r2, 0xffff2f86, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x48) 07:19:33 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x81000000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xf}, 0x0) 07:19:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x4c, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 402.975030][T15841] loop3: detected capacity change from 0 to 128 [ 402.994484][T15841] FAT-fs (loop3): Unrecognized mount option "al´uşĂ¨÷ÎŇlow_utime=00000000000000000000000" or missing value 07:19:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x696}, 0x0) 07:19:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x60, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:33 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) (async) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616cb475bac3a813f7ced26c6f775f7574696d653d30303030303030303030303030303030303030303030302c646f74732c646f74732c6e6f646f74732c6e6f646f74732c6572726f72733d636f6e74696e75e1006e6f646f74732c00"], 0x1, 0x284, &(0x7f0000000500)="$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") (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x900}, 0x0) [ 403.219610][T15865] loop3: detected capacity change from 0 to 128 07:19:33 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@dots}, {@nodots}, {@fat=@errors_continue}, {@fat=@tz_utc}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:33 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x81ffffff, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x68, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:33 executing program 2: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) (async, rerun: 64) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x2, 0x2, 0x85}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r1}, 0x38) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000008c0)={r1, &(0x7f0000000780), &(0x7f0000000880)=""/25}, 0x20) (async) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) (async) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) (async) timer_create(0x0, &(0x7f0000000100), &(0x7f0000000180)) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeef, 0x8031, 0xffffffffffffffff, 0x0) (async, rerun: 64) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) (rerun: 64) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x18, 0x2, 0xc3, 0x85, 0x0, 0xffffffffffffffff, 0x2000, '\x00', 0x0, r0}, 0x48) (async) syz_clone(0x4200100, &(0x7f0000000340)="936a87ba5683d350799c545cd6dc951f08133fe45a91ffbeed2a747955d96adf28a2bad3c1b2fd8a1816798ec7968a8fbbbe980721b6e11d8f3f75628e067973691d82ee6194e37af2101af32683d91a8c3f933fa6c96f874d91ea9618d7216aa69323f0ae82871c34f86586e3c6d68c15c301dba6ae8ac63560813b24e33d67e27d4b663a4f099b473e8bb336720e9bd55ed820acba6ec5f0289ac6ec9942c6864d710f9b82d323afccb05f2a117a001a6824121fb0ea66d01747f95724601ea395ba136974a01096bf0902a529055b3f77f47558f69548cd9da5fd8c6fb9c13d4d640f7f279bf25dbb165f9109", 0xee, &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="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") creat(&(0x7f0000000240)='./file0\x00', 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) (async) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0x3, @none}, 0xe) (async) r2 = syz_io_uring_complete(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1b, 0x8, 0x1, 0x3, 0x800, r2, 0xffff2f86, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x48) 07:19:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 07:19:33 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616cb475bac3a813f7ced26c6f775f7574696d653d30303030303030303030303030303030303030303030302c646f74732c646f74732c6e6f646f74732c6e6f646f74732c6572726f72733d636f6e74696e75e1006e6f646f74732c00"], 0x1, 0x284, &(0x7f0000000500)="$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") (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x6c, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xffe}, 0x0) [ 403.773737][T15881] loop3: detected capacity change from 0 to 128 [ 403.797388][T15881] FAT-fs (loop3): Unrecognized mount option "al´uşĂ¨÷ÎŇlow_utime=00000000000000000000000" or missing value 07:19:33 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x74, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:33 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x88470000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x9606}, 0x0) [ 403.835475][T15896] loop0: detected capacity change from 0 to 128 07:19:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x7a, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x300, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:34 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@dots}, {@nodots}, {@fat=@errors_continue}, {@fat=@tz_utc}]}, 0x1, 0x284, &(0x7f0000000500)="$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") (async, rerun: 64) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 07:19:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x88480000, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:34 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x77, 0xd0, 0x1, 0x81, 0x0, 0x5, 0x804, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x8000000000000001, 0xf6}, 0x4000, 0xffe0000000000000, 0x4, 0x3, 0x6, 0x10001, 0x6, 0x0, 0xffff, 0x0, 0x9a61}, 0xffffffffffffffff, 0x6, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7f) 07:19:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xfe0f}, 0x0) 07:19:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x500, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 07:19:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x88a8ffff, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x600, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 404.178675][T15919] loop0: detected capacity change from 0 to 128 07:19:34 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x77, 0xd0, 0x1, 0x81, 0x0, 0x5, 0x804, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x8000000000000001, 0xf6}, 0x4000, 0xffe0000000000000, 0x4, 0x3, 0x6, 0x10001, 0x6, 0x0, 0xffff, 0x0, 0x9a61}, 0xffffffffffffffff, 0x6, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2401, 0x0) (async) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7f) 07:19:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 07:19:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x618, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xc5a857e5, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:34 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@dots}, {@nodots}, {@fat=@errors_continue}, {@fat=@tz_utc}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 07:19:34 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x77, 0xd0, 0x1, 0x81, 0x0, 0x5, 0x804, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x8000000000000001, 0xf6}, 0x4000, 0xffe0000000000000, 0x4, 0x3, 0x6, 0x10001, 0x6, 0x0, 0xffff, 0x0, 0x9a61}, 0xffffffffffffffff, 0x6, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7f) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) (async) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x77, 0xd0, 0x1, 0x81, 0x0, 0x5, 0x804, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x8000000000000001, 0xf6}, 0x4000, 0xffe0000000000000, 0x4, 0x3, 0x6, 0x10001, 0x6, 0x0, 0xffff, 0x0, 0x9a61}, 0xffffffffffffffff, 0x6, r1, 0x0) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2401, 0x0) (async) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7f) (async) 07:19:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x700, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:34 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) shmget$private(0x0, 0x1000, 0x4, &(0x7f0000bdc000/0x1000)=nil) r0 = syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)=ANY=[@ANYBLOB='allow_utime=00000000000000000000000,dots,dots,n\x00\x00\x00\x00s,nodots,errors=continue,discard,\x00'], 0x1, 0x284, &(0x7f0000000500)="$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") r1 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000004000/0x2000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) shmat(r1, &(0x7f0000bdc000/0x3000)=nil, 0x1000) ptrace$setregset(0x4205, r0, 0x3, &(0x7f0000000040)={&(0x7f0000000280)="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", 0xfb}) open(&(0x7f0000000000)='./file2\x00', 0x0, 0x4e) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 07:19:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x900, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:34 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xe557a8c5, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000480)='./file2\x00', 0x10047, &(0x7f0000000140)=ANY=[@ANYBLOB="b9c5d6a5e02b2c28e292d3db28e598264a4bd97435be531000d1d02610f714cd83c2887afc6647dbacc25429a35ab59edbec888fd38d8ff4f5a7a188461e618f714fb8047ab3f2ea867b391f2d77d562a822f9efe6571dc55a291601a8d043eb20dbced9bf3b4cefe449462da9c30365d5ead0b9e32f294f50ff31e4c012adcb3110c8f706fd6c5a928c31494fb72aa0549d74a5bd9f839030491c4d9a13498c8f41c610f98783d7522384923752cfd1bd218d878c87135b8e060072aef89360f885f1e137fe31"], 0x3, 0x504, &(0x7f0000000800)="$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") [ 404.586348][T16012] loop0: detected capacity change from 0 to 128 [ 404.619085][T16026] loop3: detected capacity change from 0 to 128 07:19:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 07:19:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0xa00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 404.646408][T16026] FAT-fs (loop3): Unrecognized mount option "n" or missing value [ 404.655512][T16030] loop2: detected capacity change from 0 to 512 07:19:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) [ 404.708210][T16030] ext4: Unknown parameter 'ąĹÖĄŕ+' 07:19:35 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000280)=ANY=[@ANYBLOB="616c6c6f775f3030303030303003301a303030303030303030302c646f74692c646f74732c6e6f646f74732c6e6f646f74732c6572726f72733d636f6e74696e75652c646973636172642c0000ffffffffffffffec16a626d9d5835b880735985e63aaa4a9e62da38029fee7e5eb4b542dcb94bf46e75c9cddf2421437902e2fe260b6609113b626f8bdd7699362b575d6d1e196e973f1a3b798000ac90920f726c3f3c86ab96b03129553ef85b217120fd537f568f6f608311024852af1a8e6c31c0a31deb064f111b063e895f71e8140a814849c9b8c5c7e71e259f6181379f656513afb289e7d54fd8ff3857818c293acc8faa1bcdad3f207c47d1f38b96f5ddea4a2252f3fb33890bf3a6c8723ed7776b9dd6ea339cd24badf36a1c31557704f76d23936aac92edc28331293e4afb0352a8082b29b9176704c6c7036ad78ff26855d68eeadf0d8c1661d69138b7ac47e93fe4e869c6672783ecfb6cdafef1c0aa5e76d459fb7e30aaf29a05621c0e3e19f8b2f7409cf2c4cded6089e2f7b3e717f74528fff9e58522282d05ceb0cf89811efb08385e2d3bd8956dea9060f437bd80930eecdd0a912c2094992a08af6784d5bdca26497a899ae824a0603fc8cb5f9d782488d4e6df2558a93c37838fd"], 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdf000/0x3000)=nil, 0x3000, 0x17) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x100, 0x280800) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000040)={0xaf, 0x5, 0x1}) 07:19:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xeaffffff, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0xb00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 07:19:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000480)='./file2\x00', 0x10047, &(0x7f0000000140)=ANY=[@ANYBLOB="b9c5d6a5e02b2c28e292d3db28e598264a4bd97435be531000d1d02610f714cd83c2887afc6647dbacc25429a35ab59edbec888fd38d8ff4f5a7a188461e618f714fb8047ab3f2ea867b391f2d77d562a822f9efe6571dc55a291601a8d043eb20dbced9bf3b4cefe449462da9c30365d5ead0b9e32f294f50ff31e4c012adcb3110c8f706fd6c5a928c31494fb72aa0549d74a5bd9f839030491c4d9a13498c8f41c610f98783d7522384923752cfd1bd218d878c87135b8e060072aef89360f885f1e137fe31"], 0x3, 0x504, &(0x7f0000000800)="$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") 07:19:35 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) shmget$private(0x0, 0x1000, 0x4, &(0x7f0000bdc000/0x1000)=nil) (async) r0 = syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)=ANY=[@ANYBLOB='allow_utime=00000000000000000000000,dots,dots,n\x00\x00\x00\x00s,nodots,errors=continue,discard,\x00'], 0x1, 0x284, &(0x7f0000000500)="$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") r1 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000004000/0x2000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) (async) shmat(r1, &(0x7f0000bdc000/0x3000)=nil, 0x1000) ptrace$setregset(0x4205, r0, 0x3, &(0x7f0000000040)={&(0x7f0000000280)="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", 0xfb}) open(&(0x7f0000000000)='./file2\x00', 0x0, 0x4e) (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x96060000}, 0x0) 07:19:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0xc00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 404.952528][T16050] loop2: detected capacity change from 0 to 512 [ 404.982519][T16047] loop3: detected capacity change from 0 to 128 [ 405.001714][T16050] ext4: Unknown parameter 'ąĹÖĄŕ+' 07:19:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xeaffffff}, 0x0) 07:19:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000480)='./file2\x00', 0x10047, &(0x7f0000000140)=ANY=[@ANYBLOB="b9c5d6a5e02b2c28e292d3db28e598264a4bd97435be531000d1d02610f714cd83c2887afc6647dbacc25429a35ab59edbec888fd38d8ff4f5a7a188461e618f714fb8047ab3f2ea867b391f2d77d562a822f9efe6571dc55a291601a8d043eb20dbced9bf3b4cefe449462da9c30365d5ead0b9e32f294f50ff31e4c012adcb3110c8f706fd6c5a928c31494fb72aa0549d74a5bd9f839030491c4d9a13498c8f41c610f98783d7522384923752cfd1bd218d878c87135b8e060072aef89360f885f1e137fe31"], 0x3, 0x504, &(0x7f0000000800)="$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") [ 405.027036][T16057] loop0: detected capacity change from 0 to 128 [ 405.046985][T16047] FAT-fs (loop3): Unrecognized mount option "n" or missing value 07:19:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0xd00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xf0ffffff, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 405.080250][T16057] FAT-fs (loop0): Unrecognized mount option "allow_000000000000000000" or missing value [ 405.139436][T16066] loop2: detected capacity change from 0 to 512 [ 405.154766][T16057] ================================================================== [ 405.160262][T16066] ext4: Unknown parameter 'ąĹÖĄŕ+' [ 405.162881][T16057] BUG: KCSAN: data-race in fsnotify_destroy_mark / fsnotify_handle_inode_event [ 405.176926][T16057] [ 405.179265][T16057] write to 0xffff88810450e364 of 4 bytes by task 6443 on cpu 0: [ 405.186909][T16057] fsnotify_destroy_mark+0x146/0x190 [ 405.192220][T16057] __se_sys_inotify_rm_watch+0xfd/0x180 [ 405.197792][T16057] __x64_sys_inotify_rm_watch+0x31/0x40 [ 405.203350][T16057] do_syscall_64+0x41/0xc0 [ 405.207778][T16057] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 405.213709][T16057] [ 405.216029][T16057] read to 0xffff88810450e364 of 4 bytes by task 16057 on cpu 1: [ 405.223670][T16057] fsnotify_handle_inode_event+0xfa/0x1f0 [ 405.229387][T16057] fsnotify+0x101c/0x1150 [ 405.233712][T16057] __fsnotify_parent+0x307/0x480 [ 405.238650][T16057] __fput+0x249/0x600 [ 405.242724][T16057] ____fput+0x15/0x20 [ 405.246713][T16057] task_work_run+0x135/0x1a0 [ 405.251304][T16057] exit_to_user_mode_loop+0xd1/0xe0 [ 405.256519][T16057] exit_to_user_mode_prepare+0x6c/0xb0 [ 405.261988][T16057] syscall_exit_to_user_mode+0x26/0x140 [ 405.267547][T16057] do_syscall_64+0x4d/0xc0 [ 405.271979][T16057] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 405.277880][T16057] [ 405.280199][T16057] value changed: 0x00000001 -> 0x00000000 [ 405.285911][T16057] [ 405.288243][T16057] Reported by Kernel Concurrency Sanitizer on: [ 405.294392][T16057] CPU: 1 PID: 16057 Comm: syz-executor.0 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0 [ 405.304511][T16057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 405.314569][T16057] ================================================================== 07:19:35 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdf000/0x3000)=nil, 0x3000, 0x17) syz_open_dev$vcsu(&(0x7f0000000000), 0x100, 0x280800) (async) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x100, 0x280800) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000040)={0xaf, 0x5, 0x1}) 07:19:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0xe00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 07:19:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}, 0x13008, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x9, 0x0, 0x0, 0x0, 0x865f, 0x2e, &(0x7f00000002c0)=""/46, 0x0, 0x10, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000640)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0xd, 0x6, 0xfffffffa}, 0x10}, 0x80) write$cgroup_int(r4, &(0x7f0000000200)=0x4614, 0x43405) r5 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5, &(0x7f0000000c80)=ANY=[@ANYBLOB="1800000000640000000000000000000004000000f0ffffff4600fefff0ffffff9500000000000000df9a17ad4731d3d1fc5112850ed51f25fb7289a197433860733ce54304843968d0bca58bd090e86f477aa618e4c279ebb7f70d01df8affc46e49b4489e7d89999088424347f8900ddf27d018e19bd061ad90fe34c03c41ffff1f527bcec950446612ae993b5d3e03ee8dd78c4e9bbbf86c1a09b4a97ea81441fba6c7bb16c16a3ce2f9a4eb6f0c305113def198d8e6a2d838829ee833dd64f05d6ca752fce533ac86042897457d0c68f8950ff8ce5a8ea94c528e74cdd9bdfe29156ff1553ad244b4fe8e83ac1e5d7c2aa921ad56670447b0d73fa40e77e84b30375a1b48d38bfde5901902d286b0b2ea9de94251fa41bccf5357f5f3439b902e2d56e3c3784e50a579fe5121567d9ef1c02ee6e95bc1c8cfafa734b71733"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x5, &(0x7f00000007c0)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3ff}, @exit], &(0x7f0000000800)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000840)=""/221, 0x41100, 0xd, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000940)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xe, 0x9cb, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[r4, 0xffffffffffffffff, 0xffffffffffffffff, r6, r3]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a80)={&(0x7f0000000600)='alarmtimer_suspend\x00', r7}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x13008, 0x0, 0x0, 0x0, 0x5bbb, 0x10}, r5, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3, 0xa6, 0x1, 0x0, 0x0, 0x2, 0xc48b4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000180), 0x9}, 0xc40, 0x0, 0x8c, 0x8, 0x0, 0xf69, 0x4, 0x0, 0x17}, 0xffffffffffffffff, 0x7, r0, 0x3) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000e00), 0x8) r9 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r9, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r10, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, 0xf, 0x6, 0x101, 0x0, 0x0, {0x5}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0x2}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}]}, 0x24}}, 0x5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e80)={0x18, 0x8, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb4f8559, 0x0, 0x0, 0x0, 0x7ff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0xf, 0x1, 0x4, 0x80000001}, @alu={0x7, 0x1, 0x0, 0x1, 0x9, 0x20, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xff}]}, &(0x7f0000000540)='GPL\x00', 0x8000, 0x6e, &(0x7f0000000580)=""/110, 0x41000, 0x8, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000740)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x4, 0x2, 0x800, 0x5602f909}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e40)=[0xffffffffffffffff, r8, r6]}, 0x80) 07:19:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xfeffffff, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:35 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) shmget$private(0x0, 0x1000, 0x4, &(0x7f0000bdc000/0x1000)=nil) (async, rerun: 32) r0 = syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)=ANY=[@ANYBLOB='allow_utime=00000000000000000000000,dots,dots,n\x00\x00\x00\x00s,nodots,errors=continue,discard,\x00'], 0x1, 0x284, &(0x7f0000000500)="$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") (async, rerun: 32) r1 = shmget$private(0x0, 0x2000, 0x54001800, &(0x7f0000004000/0x2000)=nil) (rerun: 32) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) shmat(r1, &(0x7f0000bdc000/0x3000)=nil, 0x1000) (async) ptrace$setregset(0x4205, r0, 0x3, &(0x7f0000000040)={&(0x7f0000000280)="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", 0xfb}) (async) open(&(0x7f0000000000)='./file2\x00', 0x0, 0x4e) (async, rerun: 64) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 07:19:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0xf00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xfe0f0000}, 0x0) 07:19:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x1100, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xfeffffff}, 0x0) 07:19:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x1200, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xffffa888, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 405.441461][T16090] loop3: detected capacity change from 0 to 128 [ 405.455823][T16082] loop0: detected capacity change from 0 to 128 [ 405.470801][T16082] FAT-fs (loop0): Unrecognized mount option "allow_000000000000000000" or missing value 07:19:35 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdf000/0x3000)=nil, 0x3000, 0x17) r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x100, 0x280800) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000040)={0xaf, 0x5, 0x1}) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) madvise(&(0x7f0000bdf000/0x3000)=nil, 0x3000, 0x17) (async) syz_open_dev$vcsu(&(0x7f0000000000), 0x100, 0x280800) (async) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000040)={0xaf, 0x5, 0x1}) (async) 07:19:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 07:19:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x1806, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 405.757497][T16112] loop0: detected capacity change from 0 to 128 [ 405.764989][T16112] FAT-fs (loop0): Unrecognized mount option "allow_000000000000000000" or missing value 07:19:35 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xffffff7f, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:35 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x2428, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xffffffea}, 0x0) 07:19:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x32600) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}, 0x13008, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x9, 0x0, 0x0, 0x0, 0x865f, 0x2e, &(0x7f00000002c0)=""/46, 0x0, 0x10, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000640)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0xd, 0x6, 0xfffffffa}, 0x10}, 0x80) write$cgroup_int(r4, &(0x7f0000000200)=0x4614, 0x43405) (async) r5 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) (async) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x5, &(0x7f00000007c0)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3ff}, @exit], &(0x7f0000000800)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000840)=""/221, 0x41100, 0xd, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000940)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xe, 0x9cb, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[r4, 0xffffffffffffffff, 0xffffffffffffffff, r6, r3]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a80)={&(0x7f0000000600)='alarmtimer_suspend\x00', r7}, 0x10) (async) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x13008, 0x0, 0x0, 0x0, 0x5bbb, 0x10}, r5, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3, 0xa6, 0x1, 0x0, 0x0, 0x2, 0xc48b4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000180), 0x9}, 0xc40, 0x0, 0x8c, 0x8, 0x0, 0xf69, 0x4, 0x0, 0x17}, 0xffffffffffffffff, 0x7, r0, 0x3) (async) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000e00), 0x8) (async) r9 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) getsockname$packet(r9, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r10, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, 0xf, 0x6, 0x101, 0x0, 0x0, {0x5}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0x2}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}]}, 0x24}}, 0x5) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e80)={0x18, 0x8, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb4f8559, 0x0, 0x0, 0x0, 0x7ff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0xf, 0x1, 0x4, 0x80000001}, @alu={0x7, 0x1, 0x0, 0x1, 0x9, 0x20, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xff}]}, &(0x7f0000000540)='GPL\x00', 0x8000, 0x6e, &(0x7f0000000580)=""/110, 0x41000, 0x8, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000740)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x4, 0x2, 0x800, 0x5602f909}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e40)=[0xffffffffffffffff, r8, r6]}, 0x80) 07:19:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x2500, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:36 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) r0 = syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xfffffffffffffea7}, 0x1, 0x0, 0x0, 0x10000}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c00000000000003ff0f8c6f76b3c983ea2c207a", @ANYRES32=r4, @ANYBLOB="01302379b2000000010000001cf9ff971affff00010060ad3d4e50e72b5f46646765"], 0x3c}}, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', 0x4080, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYRES16=r0, @ANYRESDEC=r1, @ANYRESDEC=r2], 0x1, 0x284, &(0x7f0000000240)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:36 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xffffff81, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r1}, 0x8) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x32600) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0)}, 0x13008, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x9, 0x0, 0x0, 0x0, 0x865f, 0x2e, &(0x7f00000002c0)=""/46, 0x0, 0x10, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000640)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0xd, 0x6, 0xfffffffa}, 0x10}, 0x80) write$cgroup_int(r4, &(0x7f0000000200)=0x4614, 0x43405) r5 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x5, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(r2, &(0x7f0000000240)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x5, &(0x7f00000007c0)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3ff}, @exit], &(0x7f0000000800)='syzkaller\x00', 0x0, 0xdd, &(0x7f0000000840)=""/221, 0x41100, 0xd, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000940)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xe, 0x9cb, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[r4, 0xffffffffffffffff, 0xffffffffffffffff, r6, r3]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a80)={&(0x7f0000000600)='alarmtimer_suspend\x00', r7}, 0x10) (async) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x13008, 0x0, 0x0, 0x0, 0x5bbb, 0x10}, r5, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3, 0xa6, 0x1, 0x0, 0x0, 0x2, 0xc48b4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000180), 0x9}, 0xc40, 0x0, 0x8c, 0x8, 0x0, 0xf69, 0x4, 0x0, 0x17}, 0xffffffffffffffff, 0x7, r0, 0x3) (async) r8 = bpf$ITER_CREATE(0x21, &(0x7f0000000e00), 0x8) r9 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r9, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r10, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r10, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (async) sendmsg$IPSET_CMD_GET_BYINDEX(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, 0xf, 0x6, 0x101, 0x0, 0x0, {0x5}, [@IPSET_ATTR_INDEX={0x6, 0xb, 0x2}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}]}, 0x24}}, 0x5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e80)={0x18, 0x8, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb4f8559, 0x0, 0x0, 0x0, 0x7ff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @generic={0x0, 0xf, 0x1, 0x4, 0x80000001}, @alu={0x7, 0x1, 0x0, 0x1, 0x9, 0x20, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xff}]}, &(0x7f0000000540)='GPL\x00', 0x8000, 0x6e, &(0x7f0000000580)=""/110, 0x41000, 0x8, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000740)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000dc0)={0x4, 0x2, 0x800, 0x5602f909}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000e40)=[0xffffffffffffffff, r8, r6]}, 0x80) 07:19:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x2824, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 406.495670][T16147] loop3: detected capacity change from 0 to 128 [ 406.522459][T16147] FAT-fs (loop3): Unrecognized mount option "0xffffffffffffffff˙˙0000000000000000000300000000000000000004" or missing value 07:19:36 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_io_uring_setup(0x3133, &(0x7f0000000000)={0x0, 0xe705, 0x80, 0x3, 0xe6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000bdb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:36 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xffffffea, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 07:19:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x2e00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f0000000140)=@framed={{}, [@jmp={0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb6}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r4, 0xc0189373, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0x3}}, '.\x00'}) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x20, r11, 0x715, 0x0, 0x0, {{0x5}, {@void, @val={0xc, 0x117}}}}, 0x20}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r9, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x58, r11, 0x200, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x6, 0x28}}}}, [@NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x12, 0xbd, [0x2, 0x7f, 0x2, 0x1ff, 0x6, 0x6, 0x5]}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x1}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x4}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0xc67, 0xe051}}]}, 0x58}, 0x1, 0x0, 0x0, 0xc000}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r8, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) bind$packet(r4, &(0x7f0000000300)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000000)="cf1e", 0x2, 0x1, &(0x7f0000000040)={0x11, 0x1, r8, 0x1, 0x1, 0x6, @multicast}, 0x14) 07:19:36 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) r0 = syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xfffffffffffffea7}, 0x1, 0x0, 0x0, 0x10000}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c00000000000003ff0f8c6f76b3c983ea2c207a", @ANYRES32=r4, @ANYBLOB="01302379b2000000010000001cf9ff971affff00010060ad3d4e50e72b5f46646765"], 0x3c}}, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', 0x4080, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYRES16=r0, @ANYRESDEC=r1, @ANYRESDEC=r2], 0x1, 0x284, &(0x7f0000000240)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) (async) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xfffffffffffffea7}, 0x1, 0x0, 0x0, 0x10000}, 0x0) (async) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) (async) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) (async) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c00000000000003ff0f8c6f76b3c983ea2c207a", @ANYRES32=r4, @ANYBLOB="01302379b2000000010000001cf9ff971affff00010060ad3d4e50e72b5f46646765"], 0x3c}}, 0x0) (async) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', 0x4080, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYRES16=r0, @ANYRESDEC=r1, @ANYRESDEC=r2], 0x1, 0x284, &(0x7f0000000240)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 07:19:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}, 0x1, 0x0, 0x0, 0xfffffffe}, 0x0) [ 406.611638][T16152] __nla_validate_parse: 43 callbacks suppressed [ 406.611668][T16152] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 07:19:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x4800, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:36 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xfffffff0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 406.652996][T16157] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 406.662440][T16156] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 406.690642][T16166] loop0: detected capacity change from 0 to 128 07:19:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x2) [ 406.701813][T16167] loop3: detected capacity change from 0 to 128 [ 406.716581][ T26] audit: type=1400 audit(1688887176.816:410): avc: denied { map } for pid=16158 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=67360 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 406.725687][T16165] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 406.741202][ T26] audit: type=1400 audit(1688887176.816:411): avc: denied { read write } for pid=16158 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=67360 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 406.751323][T16152] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 406.790352][T16167] FAT-fs (loop3): Unrecognized mount option "0xffffffffffffffff˙˙0000000000000000000300000000000000000004" or missing value 07:19:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x4c00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 406.809030][T16169] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:36 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0xfffffffe, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 406.873440][T16190] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. 07:19:37 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") (async, rerun: 64) syz_io_uring_setup(0x3133, &(0x7f0000000000)={0x0, 0xe705, 0x80, 0x3, 0xe6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000bdb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) (async, rerun: 64) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x4) 07:19:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f0000000140)=@framed={{}, [@jmp={0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb6}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) (async) r4 = socket$packet(0x11, 0x3, 0x300) (async) r5 = socket(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) (async) r7 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) getsockname$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r4, 0xc0189373, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0x3}}, '.\x00'}) (async) r10 = socket$nl_generic(0x10, 0x3, 0x10) (async) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x20, r11, 0x715, 0x0, 0x0, {{0x5}, {@void, @val={0xc, 0x117}}}}, 0x20}}, 0x0) (async) sendmsg$NL80211_CMD_NEW_STATION(r9, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x58, r11, 0x200, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x6, 0x28}}}}, [@NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x12, 0xbd, [0x2, 0x7f, 0x2, 0x1ff, 0x6, 0x6, 0x5]}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x1}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x4}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0xc67, 0xe051}}]}, 0x58}, 0x1, 0x0, 0x0, 0xc000}, 0x0) (async) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r8, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) bind$packet(r4, &(0x7f0000000300)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000000)="cf1e", 0x2, 0x1, &(0x7f0000000040)={0x11, 0x1, r8, 0x1, 0x1, 0x6, @multicast}, 0x14) 07:19:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x6000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 406.940956][T16193] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 07:19:37 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x6800, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) [ 406.986499][T16199] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'. [ 407.011619][T16196] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 07:19:38 executing program 3: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) r0 = syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) (async) getsockname$packet(r3, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xfffffffffffffea7}, 0x1, 0x0, 0x0, 0x10000}, 0x0) (async) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xfffffffffffffea7}, 0x1, 0x0, 0x0, 0x10000}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x8080, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c00000000000003ff0f8c6f76b3c983ea2c207a", @ANYRES32=r4, @ANYBLOB="01302379b2000000010000001cf9ff971affff00010060ad3d4e50e72b5f46646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="3c00000000000003ff0f8c6f76b3c983ea2c207a", @ANYRES32=r4, @ANYBLOB="01302379b2000000010000001cf9ff971affff00010060ad3d4e50e72b5f46646765"], 0x3c}}, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000200)='./file0\x00', 0x4080, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYRES16=r0, @ANYRESDEC=r1, @ANYRESDEC=r2], 0x1, 0x284, &(0x7f0000000240)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x9) 07:19:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="0f00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f0000000140)=@framed={{}, [@jmp={0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb6}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) (async) r2 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) (async) getsockname$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r4, 0xc0189373, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r5, {0x3}}, '.\x00'}) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r10, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x20, r11, 0x715, 0x0, 0x0, {{0x5}, {@void, @val={0xc, 0x117}}}}, 0x20}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r9, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x58, r11, 0x200, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x6, 0x28}}}}, [@NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x12, 0xbd, [0x2, 0x7f, 0x2, 0x1ff, 0x6, 0x6, 0x5]}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x1}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x4}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0xc67, 0xe051}}]}, 0x58}, 0x1, 0x0, 0x0, 0xc000}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r8, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r8, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32=r8, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) bind$packet(r4, &(0x7f0000000300)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) sendto$packet(r0, &(0x7f0000000000)="cf1e", 0x2, 0x1, &(0x7f0000000040)={0x11, 0x1, r8, 0x1, 0x1, 0x6, @multicast}, 0x14) (async) sendto$packet(r0, &(0x7f0000000000)="cf1e", 0x2, 0x1, &(0x7f0000000040)={0x11, 0x1, r8, 0x1, 0x1, 0x6, @multicast}, 0x14) 07:19:38 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x6c00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:38 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") syz_io_uring_setup(0x3133, &(0x7f0000000000)={0x0, 0xe705, 0x80, 0x3, 0xe6}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000bdb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0xf) 07:19:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x696) 07:19:38 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x7400, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1000000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) [ 407.970141][T16227] loop0: detected capacity change from 0 to 128 [ 407.989168][T16231] loop3: detected capacity change from 0 to 128 [ 408.005690][T16231] FAT-fs (loop3): Unrecognized mount option "0xffffffffffffffff˙˙0000000000000000000300000000000000000004" or missing value 07:19:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x900) 07:19:38 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x7a00, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x1, 0x1, 0x20, 0x0, 0x0, 0x20, 0x40100, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x73, 0x0, @perf_config_ext={0x8, 0x9}, 0x5880, 0xffffffff, 0x9, 0x2, 0x0, 0x4, 0x6, 0x0, 0x8, 0x0, 0xffffffffffffff23}, 0x0, 0x9, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004280, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x3}}, {@dots}, {@nodots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x20028000, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:38 executing program 2: sched_setparam(0x0, 0x0) getpid() r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000a00)={0x40800000, 0x0, 0x0, &(0x7f0000000580), {0x37}, 0x0, 0x0, &(0x7f0000000680)=""/144, 0x0, 0x0, {r0}}, 0x58) r1 = syz_open_dev$vcsn(&(0x7f0000000080), 0x20, 0x82101) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r2, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) r3 = open(&(0x7f00000002c0)='./file0\x00', 0x402, 0x38) pipe2$watch_queue(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) r8 = syz_io_uring_complete(0x0) r9 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r9, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) r10 = accept4$inet(r0, &(0x7f00000009c0)={0x2, 0x0, @loopback}, &(0x7f0000000a80)=0x10, 0x800) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r12, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r13, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) io_submit(0x0, 0xa, &(0x7f0000001b80)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x6, 0x401, r0, &(0x7f0000000000)="b12cea2c1d205aed603b78806f35ab3fd69007ebe5fadcf46a425c8ead9f5f4a4830ee25", 0x24, 0x0, 0x0, 0x1, r0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x8000, r1, &(0x7f00000000c0)="2c953b32ba28f022fde155cfec40b5198e375c8a930f911cb1c215b993ab0ebb3d8f6880806fb90ce5a48928762c222cefb0926a27764ebf2eaaac0db9825a2c299cef414845b16179a40cf263e0162f93bbabd080c8ab993a622277d489ac75733ca6cc5abae9e614d5175453817cfd559348b217e6873ed40dd95e4c01871797ccbd91e59e290eb97b948e4505d97f654560fb1ff20b16da58d8fbcb3088b229d1a3ab8dd1dfe11206e87e3fd553dcb081ab758f2eea06e4930a43a1d6dd3fa3a42ec35be5fc310c185f9bfe4dd161604f8d5e9dbc992c2a336f2e63b776445d812abd8afbf47a37eb430c13f94c05a5c5c7a8", 0xf4, 0xff, 0x0, 0x3, r2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x9, r0, &(0x7f0000000200)="7c90014479701c88bf6615df5ec91d21a32dd3aae09dd8e618b4c69a0cdf15c88d8db6845548eee6968bf672b528f41ff5cb50968b96f3033ea51943e09f7a72b7e430b3b1e81dcb6c43e43a725be996923b5c97e06c96cdaf944c3d95e441", 0x5f, 0x1, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x4, 0x3, r3, &(0x7f0000000300)="b147186b05a3a356a2081fdff8695b1a2ceb4a5f10f8ef0d50ff45c8570d4119c1c2bcdf4a8d22673f8e34d7e929f7b959670d4239a73a2ae1cdf2b1b98fe9158528c817c01ae3d8e22c265369cd8145987a11a3017df50a5880d1382584aaf9e25c4862de7fd253638847ca42047bd8aa5b6eab44c0311b41493fdf8f09975cc886a8e822a031aeb8bfdd449679843e982851635aae8ee295c208b286d5209e9a6fa05bbe1069f4776675167cb083a0e89635500cd28fae790453bafaf898fc240de06d22979bf75e60bcda767f18b57c162fab78a8652a6d94642b32e31786667631ba3959830a1c17bfa28f0d", 0xee, 0x4, 0x0, 0x3, r4}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x8, 0x80, r0, &(0x7f0000000480)="f7a0ab453dc267dd7b569b44a8f4359298621429ee25e3ab50cfba6de4fa1f63c6c0195426f9767d688b1b365971e8f21a7ace52210208e1bfaa99ea836b360bbeec6f6a5f3ae00fc9fa301931d62a6e2c163f2a66f4c41ec5c78b43ef4a617108ba82a773021cede072c6e6914c14b12f1468bcb43e8232cba90739d29cb05ab0bf4e3dc7ce900291d016cf1debbf54e26594ee357c918fe26a05b7d87ddf7d6f4c52ea6b6fc093a4db3ad56efbd91cf13f4d4753656cf1cedd70352576c83ef0c06198a3d04c26f726e1e9e89f690c34f239e22be673", 0xd7, 0x8, 0x0, 0x3}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x5, 0x40, r5, &(0x7f0000000740)="62cefb7d655c6b4ab1df8a86f59261ee61df309a3833bc04066135a1108b7e4c2cc98a224014ae094fe6f720f7e7bd622cde2681bfccfc77a1e740dc24fc4208b744b9ef685ca6fa7de2cda22a797231e5837e50dc70f38b7ed3f3a96c26d54bd6b69f65bced34a44d27fd63671f3b4d65542097ab9a56315e9157af1cf68120051aa86c7b9780644e6cbb0cb1c728516da8529d403d7e4a8bfc49955baebf9a7f7ea0ebc42b11", 0xa7, 0x7, 0x0, 0x2}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r8, &(0x7f0000000800)="4736aa22829d2abf600ea4c763e89afa0d3a7e8556e9a357a117a4d65af2a86255c4c0c976b482c80c719e89bbd316c90695ef80fd44dc3a8a738c67dbfaa69cd4c5c4a3bf48c7e9de5d6faa589cae61df31e6f38e2e29b1eacac7cf53b3217ad0081f21d9042f22fd258de3a953b39c2e0b03c312322426a3ab9af4f6ab8e5c9085137a2eebbf663723671f56a36d72950ff6a49e0c5c62cd1f2fcc51e66989a410d9c29cbaf6187655614c902504795866d3ddef2a055aa9c4d40590b8aaea99737b21a915", 0xc6, 0x745fba2f, 0x0, 0x2, r9}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x7, 0x5, r0, &(0x7f0000000900)="535f502e5d43aef9eff20a73fa695f58714dc80b59446b7db40bdb72ee027f3a9b237b1037d7ea8c8a2b97fea6e98f84f6352585b8b824368304f31e6333a590a9d1e8b44894c6c663c179cb8aded706cae61af95dabef3f47634ce73374a64294cc40b3c9", 0x65, 0x1}, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x3, 0xd54f, r10, &(0x7f0000000ac0)="7aa25fb12faf3cc7121b611ae053338ce59553b1cb18b5dece1f7878d943518c175151fe8ec999256c69d4b76147d07dd2c59cfe7ae03c5b6e5c784f5c225c847b1d6a9de326ae54ce63429a445d4e88f65f1b60ce3515610129bf18f307da266218c4d1215e4e003261f3983b1d08f34a86c17506d439157344aa63dd4c9d95b73963d41ffd38f7931738d435f8b9e2cbfbef8d6a85d348ec5c9174540cf16d250104c43a274385d94d3faaf2e3a280bc0ab768179b56dc87e39886722635066a57f57b8461b6cf56f81f67ee79c832531907193cf7f3ffa93cfed96a4a54febff15e873ab8a76a97939cac5ca38bf13e70dac58273e0eca47499b63c4e7c5fa55c2a9ec2eb0fdbc21984114ad9312232e97862f2421becb80097eece2bcdd82310a54db888d82d6023a548d3ee96789e577180a49f97540d178cceb4a8d089267b28761ea32126d7f6988604e38cdc6297475446727fadbdd397fc2e095af4abc5c54de0c0356183ee3c7e4fce5f3ea5ba8b5db2c94cdb6689e37889ae8c05b9c0ba0299fe094f92394033575bbf701fa532f40057fb28f6325673cde7e8dde7b3b2dbd7fcb0b07433578c65f6307fe89907e010babc4362d8d69faeaca1568743b00aba85a41b624c49ebe6c355934a1951e56d8fd5b039b65090b4b7852276be96bb24176ae20228779afce65b8cd6aa7de9b3d2b74e54261892e1812944aa62a65ec97592431f4a0443882403c5f36b228e603cb799b999204ef765d38ecd2128bfc63f294e615e422cba0fdf97c4228018f0038f89921abaf7dcf644b31c53ee405a52278591400c617b292981d702d5942611a64cccc2a00351eaf0067fc1487703833991c91fed784f61954089ff769165959f0380fb6715c2a05b768ff6b81a274befb8443a4145c0592b5fcb56be35e3d65978ac0a899d55b4df3a8d8943161aaeabca8c39cc9bd01c70de3d03138010ed5db1da344c4a943f1d9398ac6a293e5ebbeea5557111bdb79febdd48b8b6dff39a175f0daf263883580cccadee70e3a68668c8728b86896e99501e664b0141f860573e949dcba6ed54808dda6eb811f657909b94d10a758301e64e62cabef91f521927b8d17769bd2b6d1de9e7a7ef160b0d91d8000ec8bf9826a8d43b65b7ba3fd28a6037ad760f0e9f8823a9bbd1976e261c2ec6169a68e88223f61871b43a3fcbf92af748b0f888cedd02a1977f36ec686650d3eadd830c22eff8243bb91f6ff192610dbca41c3ab8502f4c2f193ec3002726433b045819face01765cb9bea0fdcfd109f5ed91e251daf3cddcd904fd316f44918d80e29041d1d5de89889a5c699d2335fba42b101ba30350f441454ee09f17b39b19f47dc34d24091df28a3a217889cefabf49bc59ab974b52b4e8432d51a0410781f8f477b2ffa2eec8decf7d9a1ee5586e714c8103d04123fef1a9d48b952103c2d76d3c1a95ba7f72cd3ab969713380b616da8829fe6d84439d3bb56570a4b73bbf5176876ecf5536c4c645c3e269b5c64ee20ee53f905f7d229c41fb01fa3494d29be449060d5d8d88e6c24d34c0a797c4ac93e5ca55e2e7467e5f15fe6d7f6db3bd7c39009001d436cfa602869fcb50b012d94418b8ea7ae26dd150d58ec7cb84b4fedad0473c32a9c7561ae21d2032480c354dbd42d1afe044313ddc33851e1712ba53af87f3ee7f51c9f40f47e27871e910031a4ce20dc22c26888b9c845d396b991a1a94b68ae149cfdc072c753c756b0db9063e3169e2437f5cb9ce8f54eaa887af69cc2e280e61ef37db3d97bb61338101f515bc9d73a95bb667bab674df508984175051115ba28408d7e0b542df6b05e885bef9de2ebce00fda83f1375601b7d1e2b54c77deb59bc31496dc3a93cc1d2376dfb2fbbd2d8fb74e69f324609e00753041d158dd79dad599cda122e85229beb8be1e53e51981571f3f362b99aafaf6af894e02395fa517e776d73d9921db6521a78018df44617f0395688be8d6baae7f7e70a4bab5f731878205d7d9233c22848c18d4a1cfe484e0f8b8881acb302b662ef60beeac3d5b3524e37ea7e5efbcf5470729dae8b81ac8fa24668493d908275605017cb4be88954841a197f2bbc96749aef54de171f51f4231ce556f390f3063f7f009df135165aebc20363c837b7c46a6332540d034c869be794ba30457df7f9d57f9dd467feb635ee184faf48cd50c92975f3c429bbc72faaac0a2b929f2a2b183184f3569ded5433af3afad4f1c346a35bb0b073b051b18d52f0a7e1dc664a791cb3ac8ae9ca6d76570e1a2d0b6543fc302b2046ff69c8f798f246dbe793731eb8e9f82f38b9ff64c0521d4f96434ccec3defc516bb9eb1968e0fa9493576de45df250843e9b85bb76df7bbf93edffb9240fcb1f82cbc16d772bd6d422fe119a1ba631d194588907d34aeb0fb8148153d894dc23bc9b492973c231ff04df61c3df980ea3fba934ad5785ed8f2c011d1e86e4e0493165d13c55596cd8c10a47c57bca3fc53133f7479db8abdf6510112d8343a1def84eacdd332f190330270342585ef34df7babe12f625ca71fa3c18d60832065d21c70c0974d1e150e218c9674e12f1849c831af6f15ce5cbf67230b93c798acee386d292ee37b5f171c4a5c7996ab43e2799cd67a08b00b743283011b3a26f03068521bb6b5f966ba2108659b6586bbdb50acdf6fe4950df37d72155fa86eae5d777cd64c4ebdf2b6afb1acaba2d8b3d9ad98d94462ac331f29e8729b726edc56acdcdcbb556d6cec3a1037d90b1ad14ac5cddeff299b7c25004d35ffba3cbb3c597bb42a272fa56084d04b4f9d2f64a9b1a1f12bb817894097cd0ffb825affeed5231e32ac320c577031b68b9d667f8c161b34ede992b8511929791d27a128dd4ccbc78f450bb62425480d008572965213686974b922ae857a099a0f0d3e0afcd9a01165c33c64ce75a8c2091541a8fb1a5d11578a09e77d57d081e4555225388bf90004df4edd8c225f141573dae9119df58d606a66f6dc5dc27e82b966df0c4b3715221d0d08eaf4d0dafbf881a6dc93c6349fb1a9853bc6b3a0c5d7a721774e4a56a0119dbf00952ef62eafddd88c32bab7cafcfc0c0fea19e667b7a914b8f5c66d084ee1c9f984d17a3dd63a1c78fd84424c9df83d224179d3398b108ac8e755466d24975af65d3139c39e3c3046db4fc8ba4cfb29099450bc883f624520486238803a6161beb67612ee218a9ee8a631da8b29682c4a366bc3f6874e5fab482df2a7ab56d4e73332ca338145bb6d65dd48fc3df506376d3a85964e47ad6007a6ffa597d812fb7c9647938ff87ec49024758ac39b2e25e04791315819d5be592e2266ed5795f821d4273e8852a63878ff73db8f9d452e8e3538484f90c96efc6ac9c052fa99f94d92e70472ee465bb72d67787fc52cabac81305d1c5e54c24c535e81bdc7b8a7c75d2881f4f0f0e9a8feba6b6e6e5d2723a1c2bdc75bcc10fa5ce89a455c13285a47927d12fa8c8d54cc4076b95a56fb7c85ecb564c76a84cb183bf74603b25f2aa61438c046ebdb75c7c42b02318ad7687391e1314c9aa7c2b29c17773fb1d8ba40fc5e61f23cf3b921a79b2c6d818aa72912845cfde14bc583ed30f99554665a6e44cf1159992579262c1c42277cd535683185703c8214e91a07702be2558a07b88a22c6b3f15f02f9d1b8bd2118aac88b92c9ee8fe653e8ae5621bcd0f39e5796d22e97d7a6ebda8e1b0bf8a5a9af219af14fdfb12ff2043f8eb8e646c16a779b36bebae6e2ddd765df82e200801402e7a1f5427cea20fbc9922bb5e493a2546e8b459fc55a6f1f5daae88ba4450f7749427dd41a297ce3a90399ba4bfb7f8738b63597b16d6a0687bd52003b3871ead8ca4ce4f107d7c46aef5e83c1454bcc5781e5370aa3fe4affb8eda1cc3f7913ca6cece0e1bd3a25cc67d6c9c23220065ea140bf09d9cc61797c9813844e9cf2a1a7b30875aa31b9272af67df666055b2166e8bf7976dfd007d08a2837b796e02ea8d0df9c22817ac09450b39d1dd9076e2cd0c2a0835e64b1d4536c54ece9dbc440c9840cd339c23a790b1a1edfcf20db79b3548d788d84c33a7f8ae91a290a1a8d5a7df683ee18cc35c662cd8ddce1ecce72959a1f94cf4c3cccaded7e2ea5fc3284066846e983d60b775bf4fcfcab4a7a31edc0417a44715356c7e30a74e9e59fe35f7484b39d42c4983f209c66e39f87cbcf7a52a17c56849237007a89b5bf8006c5601f69d4cf480f4d9a348503d2dc3c3a2a4cbf042ce26e23b06cf1ccfcb49e448bcdf051a98175b4597307d73b4c60ddd1cb6638df37d54426e956c1c81b699c8c1ad4294a14c1f426aca8e3851ebaae9402fffef99de350d3f1e38b48d6cbaf2afd41f80bff178edb96e23cf5666816ca7797493eeb97823e74864c98505e1d5c48461000c94c921e2da62ad723a2bcc0ff8d5b69d6a6799ba887f9335fd6b135d93d1071f33415de4f75984fe99fb3171bfd1545e878eedea2c24513723faf17ae08afd6bd67af037786e72f1ff837f7c748e3548ec898749ec5873e1469c0d41329299a931026ba82610bbc1436bb05605e41b94ebc3ee8d0be01d5ee667cff6d56e10b0e6bd9f86af124eb7e3beca83ef6cfb4522a10cdaf376ca5c71fb8254a488897579853b752c160584254639efbed4efc910c1af969ea5019b9217a064dae0f3b79f2203fa6708e78fdb31a09f6215ce69d15fd2d979781aed102abb56cc769ed5820a5961ebe3a0d2d0dd653284841b0f8a0e3cd54a9ada9e1474ad4059d63b015b459b55e7ae4eed90f68f629a9c08c99dcd0e1ba1f47d18b2b1766f2b8b4855f539ce0a004a8601b1f4f2714a944e1fc1c6bcc7530a3401fc83cd69996bda9969c150cb8aa3071e334e0327512ba832a29bc9bed534a28f8a4050b318a835c60a9e77844bfa001f268f7396198ec63191df941e48c7b9917922d3ff4782a767fb08acbc4b1abd04883019b933ca31dd7bb5857270fed576f84a33292c1cddb2bad1e0cca5a82e7d6b5dff99f8ebadcee1e7b5d2b3ca7ff3ba2c9e752992f1294d02db7604d8ad7e5889bcda7c90493ceb0f29ac85b2f0e7ec3133a72cbf0a4f6eaaf32b29b6a5dea0c2df87471f34c5c7bd01287ebbaefab7299a34479f1c326adfa56d42be4f909bf18153a3e7d9b8559da420b20430058759b82ca52f4d44e8e037d899ea5668c3abf1a66f0b25169b0278ec32c4c7f2bcb4a4d690db544f88af701afb2250aa83593b46de2d4a84018db8992054381cf00902878851384cfbd47e942172b6dcab56404988df35903d94490ff3df200d8a39ed076720ae0982ffc49b77cdb6538cbaa493c09bd13ef6e8e2d8d0ac51d0ff79bb0a44313608487bfd0dd0e3f0d50a67c6b7b75165ca4c322bdd1529896519789f323c9294eed15d8fdbe36f9bb36f7a7294593527dcfd2b8fd766222783e6187092388d413ffa7a95d8bed46ae4a6a6c5231427f43ce06b85e6a1f40327ca2317841fd084be4af3223d3e743fd430e109490927682cf40a7644125459d1a84c565c44979f68ea69980b2999840b3727f92a3263991e94cbb9b140b4c776938ef2be1d0de0a710e46454cfe397a8c021f7295aabdaee4db584cab5c5b0751f30a9951d192e95d9ace390476f31c9138f7bad23812ac60a09e01098ae9b698e11b57bd4c1352ad9fb9e594a79d0d2027cbb37abb5307fc03fb71795bbcfb2e75a143dff9b353b0047a47d7be7ca952ef2a10c35fc63e894023ac23", 0x1000, 0x80, 0x0, 0x0, r0}, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x8, 0x1da, r11, &(0x7f0000001b00)="d21820643b0f99560e91ed84a0c662f20405cc91347a87aa3fa19f06b3465cd3c35c4d11f35653ccc1cec2e30bfdb0bcbc826e85aa57", 0x36, 0xfff, 0x0, 0x1}]) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 07:19:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="2400000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0xf00) 07:19:38 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x30000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:38 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) mincore(&(0x7f0000bdc000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/109) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c6c6f775f75305497524130303030303030303030302c64e89088f6646f74732c6e6f646f74732c6e6f646f74732c6572726f72733d636f6e74696e755401003c846b3cc8c309652c645073636172642c00"/95], 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:38 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x34000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0xffe) 07:19:38 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x400300, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x9606) 07:19:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="4001000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0xfe0f) [ 408.258204][T16267] loop0: detected capacity change from 0 to 128 [ 408.266308][T16268] loop3: detected capacity change from 0 to 128 [ 408.274928][T16267] FAT-fs (loop0): Unrecognized mount option "allow_u0T—RA00000000000" or missing value 07:19:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x1, 0x1, 0x20, 0x0, 0x0, 0x20, 0x40100, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x73, 0x0, @perf_config_ext={0x8, 0x9}, 0x5880, 0xffffffff, 0x9, 0x2, 0x0, 0x4, 0x6, 0x0, 0x8, 0x0, 0xffffffffffffff23}, 0x0, 0x9, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone(0x40004280, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x3}}, {@dots}, {@nodots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x20028000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x1, 0x1, 0x20, 0x0, 0x0, 0x20, 0x40100, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x73, 0x0, @perf_config_ext={0x8, 0x9}, 0x5880, 0xffffffff, 0x9, 0x2, 0x0, 0x4, 0x6, 0x0, 0x8, 0x0, 0xffffffffffffff23}, 0x0, 0x9, 0xffffffffffffffff, 0x0) (async) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) syz_clone(0x40004280, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)={[{@fat=@allow_utime={'allow_utime', 0x3d, 0x3}}, {@dots}, {@nodots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=") (async) syz_clone(0x20028000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 07:19:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x34000) 07:19:38 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10) socket$netlink(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="c00e000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0) 07:19:38 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x1000000, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) 07:19:38 executing program 0: madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) mincore(&(0x7f0000bdc000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/109) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c6c6f775f75305497524130303030303030303030302c64e89088f6646f74732c6e6f646f74732c6e6f646f74732c6572726f72733d636f6e74696e755401003c846b3cc8c309652c645073636172642c00"/95], 0x1, 0x284, &(0x7f0000000500)="$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") syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) (async) mincore(&(0x7f0000bdc000/0x3000)=nil, 0x3000, &(0x7f0000000080)=""/109) (async) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000000)=ANY=[@ANYBLOB="616c6c6f775f75305497524130303030303030303030302c64e89088f6646f74732c6e6f646f74732c6e6f646f74732c6572726f72733d636f6e74696e755401003c846b3cc8c309652c645073636172642c00"/95], 0x1, 0x284, &(0x7f0000000500)="$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") (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 07:19:38 executing program 2: sched_setparam(0x0, 0x0) getpid() (async) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000a00)={0x40800000, 0x0, 0x0, &(0x7f0000000580), {0x37}, 0x0, 0x0, &(0x7f0000000680)=""/144, 0x0, 0x0, {r0}}, 0x58) r1 = syz_open_dev$vcsn(&(0x7f0000000080), 0x20, 0x82101) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r2, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) r3 = open(&(0x7f00000002c0)='./file0\x00', 0x402, 0x38) (async) pipe2$watch_queue(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r5 = socket$nl_route(0x10, 0x3, 0x0) (async) r6 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) getsockname$packet(r6, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) r8 = syz_io_uring_complete(0x0) (async) r9 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r9, &(0x7f0000000380)='./file0\x00', 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x20000}, 0x20) (async) r10 = accept4$inet(r0, &(0x7f00000009c0)={0x2, 0x0, @loopback}, &(0x7f0000000a80)=0x10, 0x800) (async) r11 = socket$nl_route(0x10, 0x3, 0x0) (async) r12 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) (async) getsockname$packet(r12, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffba) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32=r13, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) io_submit(0x0, 0xa, &(0x7f0000001b80)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x6, 0x401, r0, &(0x7f0000000000)="b12cea2c1d205aed603b78806f35ab3fd69007ebe5fadcf46a425c8ead9f5f4a4830ee25", 0x24, 0x0, 0x0, 0x1, r0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x8000, r1, &(0x7f00000000c0)="2c953b32ba28f022fde155cfec40b5198e375c8a930f911cb1c215b993ab0ebb3d8f6880806fb90ce5a48928762c222cefb0926a27764ebf2eaaac0db9825a2c299cef414845b16179a40cf263e0162f93bbabd080c8ab993a622277d489ac75733ca6cc5abae9e614d5175453817cfd559348b217e6873ed40dd95e4c01871797ccbd91e59e290eb97b948e4505d97f654560fb1ff20b16da58d8fbcb3088b229d1a3ab8dd1dfe11206e87e3fd553dcb081ab758f2eea06e4930a43a1d6dd3fa3a42ec35be5fc310c185f9bfe4dd161604f8d5e9dbc992c2a336f2e63b776445d812abd8afbf47a37eb430c13f94c05a5c5c7a8", 0xf4, 0xff, 0x0, 0x3, r2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x9, r0, &(0x7f0000000200)="7c90014479701c88bf6615df5ec91d21a32dd3aae09dd8e618b4c69a0cdf15c88d8db6845548eee6968bf672b528f41ff5cb50968b96f3033ea51943e09f7a72b7e430b3b1e81dcb6c43e43a725be996923b5c97e06c96cdaf944c3d95e441", 0x5f, 0x1, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x4, 0x3, r3, &(0x7f0000000300)="b147186b05a3a356a2081fdff8695b1a2ceb4a5f10f8ef0d50ff45c8570d4119c1c2bcdf4a8d22673f8e34d7e929f7b959670d4239a73a2ae1cdf2b1b98fe9158528c817c01ae3d8e22c265369cd8145987a11a3017df50a5880d1382584aaf9e25c4862de7fd253638847ca42047bd8aa5b6eab44c0311b41493fdf8f09975cc886a8e822a031aeb8bfdd449679843e982851635aae8ee295c208b286d5209e9a6fa05bbe1069f4776675167cb083a0e89635500cd28fae790453bafaf898fc240de06d22979bf75e60bcda767f18b57c162fab78a8652a6d94642b32e31786667631ba3959830a1c17bfa28f0d", 0xee, 0x4, 0x0, 0x3, r4}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x8, 0x80, r0, &(0x7f0000000480)="f7a0ab453dc267dd7b569b44a8f4359298621429ee25e3ab50cfba6de4fa1f63c6c0195426f9767d688b1b365971e8f21a7ace52210208e1bfaa99ea836b360bbeec6f6a5f3ae00fc9fa301931d62a6e2c163f2a66f4c41ec5c78b43ef4a617108ba82a773021cede072c6e6914c14b12f1468bcb43e8232cba90739d29cb05ab0bf4e3dc7ce900291d016cf1debbf54e26594ee357c918fe26a05b7d87ddf7d6f4c52ea6b6fc093a4db3ad56efbd91cf13f4d4753656cf1cedd70352576c83ef0c06198a3d04c26f726e1e9e89f690c34f239e22be673", 0xd7, 0x8, 0x0, 0x3}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x5, 0x40, r5, &(0x7f0000000740)="62cefb7d655c6b4ab1df8a86f59261ee61df309a3833bc04066135a1108b7e4c2cc98a224014ae094fe6f720f7e7bd622cde2681bfccfc77a1e740dc24fc4208b744b9ef685ca6fa7de2cda22a797231e5837e50dc70f38b7ed3f3a96c26d54bd6b69f65bced34a44d27fd63671f3b4d65542097ab9a56315e9157af1cf68120051aa86c7b9780644e6cbb0cb1c728516da8529d403d7e4a8bfc49955baebf9a7f7ea0ebc42b11", 0xa7, 0x7, 0x0, 0x2}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x2, 0x1, r8, &(0x7f0000000800)="4736aa22829d2abf600ea4c763e89afa0d3a7e8556e9a357a117a4d65af2a86255c4c0c976b482c80c719e89bbd316c90695ef80fd44dc3a8a738c67dbfaa69cd4c5c4a3bf48c7e9de5d6faa589cae61df31e6f38e2e29b1eacac7cf53b3217ad0081f21d9042f22fd258de3a953b39c2e0b03c312322426a3ab9af4f6ab8e5c9085137a2eebbf663723671f56a36d72950ff6a49e0c5c62cd1f2fcc51e66989a410d9c29cbaf6187655614c902504795866d3ddef2a055aa9c4d40590b8aaea99737b21a915", 0xc6, 0x745fba2f, 0x0, 0x2, r9}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x7, 0x5, r0, &(0x7f0000000900)="535f502e5d43aef9eff20a73fa695f58714dc80b59446b7db40bdb72ee027f3a9b237b1037d7ea8c8a2b97fea6e98f84f6352585b8b824368304f31e6333a590a9d1e8b44894c6c663c179cb8aded706cae61af95dabef3f47634ce73374a64294cc40b3c9", 0x65, 0x1}, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x3, 0xd54f, r10, &(0x7f0000000ac0)="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