0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:46 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
[ 356.013555][T13267] RBP: 00007f884fd5c1d0 R08: 0000000000000000 R09: 0000000000000000
[ 356.021555][T13267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 356.029529][T13267] R13: 00007ffda713e28f R14: 00007f884fd5c300 R15: 0000000000022000
[ 356.037525][T13267]
[ 356.048571][T13269] loop3: detected capacity change from 0 to 128
[ 356.097960][T13274] FAULT_INJECTION: forcing a failure.
[ 356.097960][T13274] name failslab, interval 1, probability 0, space 0, times 0
[ 356.110639][T13274] CPU: 1 PID: 13274 Comm: syz-executor.1 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0
[ 356.120735][T13274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023
[ 356.130801][T13274] Call Trace:
[ 356.134085][T13274]
[ 356.137081][T13274] dump_stack_lvl+0xda/0x130
[ 356.141684][T13274] dump_stack+0x15/0x20
[ 356.145857][T13274] should_fail_ex+0x21f/0x230
[ 356.150589][T13274] __should_failslab+0x92/0xa0
[ 356.155404][T13274] should_failslab+0x9/0x20
[ 356.160001][T13274] slab_pre_alloc_hook+0x38/0x180
[ 356.165111][T13274] kmem_cache_alloc_node+0x54/0x240
[ 356.170335][T13274] ? __alloc_skb+0x109/0x2e0
[ 356.174940][T13274] __alloc_skb+0x109/0x2e0
[ 356.179391][T13274] netlink_sendmsg+0x483/0x770
[ 356.184218][T13274] ? netlink_getsockopt+0x3e0/0x3e0
[ 356.189445][T13274] ____sys_sendmsg+0x37c/0x4d0
[ 356.194249][T13274] __sys_sendmsg+0x1e9/0x270
[ 356.198919][T13274] __x64_sys_sendmsg+0x46/0x50
[ 356.203700][T13274] do_syscall_64+0x41/0xc0
[ 356.208134][T13274] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 356.214103][T13274] RIP: 0033:0x7fa733391389
[ 356.218595][T13274] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 356.238239][T13274] RSP: 002b:00007fa732704168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
07:18:46 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) (fail_nth: 4)
[ 356.246667][T13274] RAX: ffffffffffffffda RBX: 00007fa7334b0f80 RCX: 00007fa733391389
[ 356.254644][T13274] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000003
[ 356.262684][T13274] RBP: 00007fa7327041d0 R08: 0000000000000000 R09: 0000000000000000
[ 356.270729][T13274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 356.278704][T13274] R13: 00007ffd52bc863f R14: 00007fa732704300 R15: 0000000000022000
[ 356.286720][T13274]
[ 356.305393][T13281] FAULT_INJECTION: forcing a failure.
[ 356.305393][T13281] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 356.318596][T13281] CPU: 0 PID: 13281 Comm: syz-executor.5 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0
[ 356.328825][T13281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023
[ 356.338904][T13281] Call Trace:
[ 356.342191][T13281]
[ 356.345141][T13281] dump_stack_lvl+0xda/0x130
[ 356.349770][T13281] dump_stack+0x15/0x20
[ 356.353930][T13281] should_fail_ex+0x21f/0x230
[ 356.358620][T13281] should_fail+0xb/0x10
[ 356.362779][T13281] should_fail_usercopy+0x1a/0x20
[ 356.367817][T13281] _copy_from_iter+0xd8/0xa40
[ 356.372577][T13281] ? kmalloc_reserve+0xfb/0x190
[ 356.377551][T13281] ? __build_skb_around+0x196/0x1f0
[ 356.382761][T13281] ? __virt_addr_valid+0x16a/0x1b0
[ 356.387978][T13281] ? __check_object_size+0x363/0x520
[ 356.393358][T13281] netlink_sendmsg+0x53c/0x770
[ 356.398139][T13281] ? netlink_getsockopt+0x3e0/0x3e0
[ 356.403350][T13281] ____sys_sendmsg+0x37c/0x4d0
[ 356.408224][T13281] __sys_sendmsg+0x1e9/0x270
[ 356.412857][T13281] __x64_sys_sendmsg+0x46/0x50
[ 356.417652][T13281] do_syscall_64+0x41/0xc0
[ 356.422077][T13281] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 356.427987][T13281] RIP: 0033:0x7f8850a0a389
[ 356.432570][T13281] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 356.452244][T13281] RSP: 002b:00007f884fd7d168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 356.460699][T13281] RAX: ffffffffffffffda RBX: 00007f8850b29f80 RCX: 00007f8850a0a389
[ 356.468693][T13281] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000004
[ 356.476723][T13281] RBP: 00007f884fd7d1d0 R08: 0000000000000000 R09: 0000000000000000
[ 356.484700][T13281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 356.492675][T13281] R13: 00007ffda713e28f R14: 00007f884fd7d300 R15: 0000000000022000
[ 356.500664][T13281]
07:18:46 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=")
syz_clone(0x1100, 0x0, 0x20200, 0x0, 0x0, 0x0)
07:18:46 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:46 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) (fail_nth: 3)
07:18:46 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) (fail_nth: 5)
07:18:46 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:46 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x2c000000, 0x0, 0x0, 0x0)
[ 356.718088][T13291] FAULT_INJECTION: forcing a failure.
[ 356.718088][T13291] name failslab, interval 1, probability 0, space 0, times 0
[ 356.730872][T13291] CPU: 1 PID: 13291 Comm: syz-executor.5 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0
[ 356.740977][T13291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023
[ 356.751061][T13291] Call Trace:
[ 356.754342][T13291]
[ 356.757296][T13291] dump_stack_lvl+0xda/0x130
[ 356.761899][T13291] dump_stack+0x15/0x20
[ 356.766113][T13291] should_fail_ex+0x21f/0x230
[ 356.770843][T13291] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0
[ 356.777176][T13291] __should_failslab+0x92/0xa0
[ 356.781981][T13291] should_failslab+0x9/0x20
[ 356.786546][T13291] slab_pre_alloc_hook+0x38/0x180
[ 356.791663][T13291] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0
[ 356.797959][T13291] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0
[ 356.804221][T13291] __kmem_cache_alloc_node+0x48/0x1d0
[ 356.809612][T13291] ? genl_family_rcv_msg_attrs_parse+0x75/0x1a0
[ 356.816011][T13291] __kmalloc+0x95/0x1a0
[ 356.820258][T13291] genl_family_rcv_msg_attrs_parse+0x75/0x1a0
[ 356.826385][T13291] ? ns_capable+0x7c/0xb0
[ 356.830836][T13291] genl_rcv_msg+0x4b3/0x720
[ 356.835355][T13291] ? nl802154_exit+0x20/0x20
[ 356.840020][T13291] ? nl802154_dump_llsec_key+0x6e0/0x6e0
[ 356.845721][T13291] ? nl802154_pre_doit+0x6a0/0x6a0
[ 356.850855][T13291] ? __rcu_read_unlock+0x4d/0x70
[ 356.855853][T13291] ? avc_has_perm_noaudit+0x1c8/0x210
[ 356.861241][T13291] netlink_rcv_skb+0x126/0x220
[ 356.866051][T13291] ? genl_bind+0x1b0/0x1b0
[ 356.870487][T13291] genl_rcv+0x28/0x40
[ 356.874571][T13291] netlink_unicast+0x56f/0x640
[ 356.879436][T13291] netlink_sendmsg+0x665/0x770
[ 356.884287][T13291] ? netlink_getsockopt+0x3e0/0x3e0
[ 356.889502][T13291] ____sys_sendmsg+0x37c/0x4d0
[ 356.894303][T13291] __sys_sendmsg+0x1e9/0x270
[ 356.898977][T13291] __x64_sys_sendmsg+0x46/0x50
[ 356.903780][T13291] do_syscall_64+0x41/0xc0
[ 356.908207][T13291] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 356.914167][T13291] RIP: 0033:0x7f8850a0a389
[ 356.918585][T13291] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 356.938271][T13291] RSP: 002b:00007f884fd7d168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 356.946736][T13291] RAX: ffffffffffffffda RBX: 00007f8850b29f80 RCX: 00007f8850a0a389
[ 356.954713][T13291] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000004
07:18:47 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) (fail_nth: 4)
[ 356.962750][T13291] RBP: 00007f884fd7d1d0 R08: 0000000000000000 R09: 0000000000000000
[ 356.970801][T13291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 356.978781][T13291] R13: 00007ffda713e28f R14: 00007f884fd7d300 R15: 0000000000022000
[ 356.986798][T13291]
[ 356.996910][T13296] loop0: detected capacity change from 0 to 128
[ 357.014354][T13297] loop3: detected capacity change from 0 to 128
[ 357.032906][T13299] FAULT_INJECTION: forcing a failure.
[ 357.032906][T13299] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 357.046055][T13299] CPU: 1 PID: 13299 Comm: syz-executor.1 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0
[ 357.056229][T13299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023
[ 357.066470][T13299] Call Trace:
[ 357.069805][T13299]
[ 357.072802][T13299] dump_stack_lvl+0xda/0x130
[ 357.077434][T13299] dump_stack+0x15/0x20
[ 357.081602][T13299] should_fail_ex+0x21f/0x230
[ 357.086313][T13299] should_fail+0xb/0x10
[ 357.090479][T13299] should_fail_usercopy+0x1a/0x20
[ 357.095588][T13299] _copy_from_iter+0xd8/0xa40
[ 357.100278][T13299] ? kmalloc_reserve+0xfb/0x190
[ 357.105232][T13299] ? __build_skb_around+0x196/0x1f0
[ 357.110478][T13299] ? __virt_addr_valid+0x16a/0x1b0
[ 357.115744][T13299] ? __check_object_size+0x363/0x520
[ 357.121103][T13299] netlink_sendmsg+0x53c/0x770
[ 357.125887][T13299] ? netlink_getsockopt+0x3e0/0x3e0
[ 357.131163][T13299] ____sys_sendmsg+0x37c/0x4d0
[ 357.136014][T13299] __sys_sendmsg+0x1e9/0x270
[ 357.140661][T13299] __x64_sys_sendmsg+0x46/0x50
[ 357.145505][T13299] do_syscall_64+0x41/0xc0
[ 357.149934][T13299] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 357.155846][T13299] RIP: 0033:0x7fa733391389
[ 357.160277][T13299] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 357.179928][T13299] RSP: 002b:00007fa732704168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 357.188367][T13299] RAX: ffffffffffffffda RBX: 00007fa7334b0f80 RCX: 00007fa733391389
[ 357.196343][T13299] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000003
[ 357.204320][T13299] RBP: 00007fa7327041d0 R08: 0000000000000000 R09: 0000000000000000
[ 357.212375][T13299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
07:18:47 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:47 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) (fail_nth: 6)
07:18:47 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) (fail_nth: 5)
[ 357.220348][T13299] R13: 00007ffd52bc863f R14: 00007fa732704300 R15: 0000000000022000
[ 357.228323][T13299]
07:18:47 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
[ 357.289848][T13306] FAULT_INJECTION: forcing a failure.
[ 357.289848][T13306] name failslab, interval 1, probability 0, space 0, times 0
[ 357.302621][T13306] CPU: 0 PID: 13306 Comm: syz-executor.1 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0
[ 357.312740][T13306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023
[ 357.322860][T13306] Call Trace:
[ 357.326150][T13306]
[ 357.329081][T13306] dump_stack_lvl+0xda/0x130
[ 357.333690][T13306] dump_stack+0x15/0x20
[ 357.337858][T13306] should_fail_ex+0x21f/0x230
[ 357.342544][T13306] __should_failslab+0x92/0xa0
[ 357.347314][T13306] should_failslab+0x9/0x20
[ 357.351831][T13306] slab_pre_alloc_hook+0x38/0x180
[ 357.356922][T13306] kmem_cache_alloc_node+0x54/0x240
[ 357.362205][T13306] ? __alloc_skb+0x109/0x2e0
[ 357.366809][T13306] __alloc_skb+0x109/0x2e0
[ 357.371266][T13306] ? sysvec_apic_timer_interrupt+0x42/0x80
[ 357.377087][T13306] netlink_ack+0x23b/0x940
[ 357.381518][T13306] ? xfd_validate_state+0x46/0xf0
[ 357.386649][T13306] ? __rcu_read_unlock+0x4d/0x70
[ 357.391646][T13306] netlink_rcv_skb+0x18f/0x220
[ 357.396507][T13306] ? rtnetlink_bind+0x60/0x60
[ 357.401228][T13306] rtnetlink_rcv+0x1c/0x20
[ 357.405683][T13306] netlink_unicast+0x56f/0x640
[ 357.410584][T13306] netlink_sendmsg+0x665/0x770
[ 357.415364][T13306] ? netlink_getsockopt+0x3e0/0x3e0
[ 357.420715][T13306] ____sys_sendmsg+0x37c/0x4d0
[ 357.425572][T13306] __sys_sendmsg+0x1e9/0x270
[ 357.430317][T13306] __x64_sys_sendmsg+0x46/0x50
[ 357.435181][T13306] do_syscall_64+0x41/0xc0
[ 357.439714][T13306] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 357.445688][T13306] RIP: 0033:0x7fa733391389
[ 357.450106][T13306] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 357.469806][T13306] RSP: 002b:00007fa732704168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 357.478237][T13306] RAX: ffffffffffffffda RBX: 00007fa7334b0f80 RCX: 00007fa733391389
07:18:47 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x80000, 0x0, 0x0, 0x0)
[ 357.486214][T13306] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000003
[ 357.494247][T13306] RBP: 00007fa7327041d0 R08: 0000000000000000 R09: 0000000000000000
[ 357.502223][T13306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 357.510277][T13306] R13: 00007ffd52bc863f R14: 00007fa732704300 R15: 0000000000022000
[ 357.518352][T13306]
07:18:47 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
[ 357.546175][T13307] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 357.570494][T13307] FAULT_INJECTION: forcing a failure.
[ 357.570494][T13307] name failslab, interval 1, probability 0, space 0, times 0
[ 357.583355][T13307] CPU: 0 PID: 13307 Comm: syz-executor.5 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0
[ 357.593502][T13307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023
[ 357.603599][T13307] Call Trace:
[ 357.606879][T13307]
[ 357.609874][T13307] dump_stack_lvl+0xda/0x130
[ 357.614497][T13307] dump_stack+0x15/0x20
[ 357.618724][T13307] should_fail_ex+0x21f/0x230
[ 357.623474][T13307] __should_failslab+0x92/0xa0
[ 357.628244][T13307] should_failslab+0x9/0x20
[ 357.632872][T13307] slab_pre_alloc_hook+0x38/0x180
[ 357.637933][T13307] kmem_cache_alloc_node+0x54/0x240
[ 357.643229][T13307] ? __alloc_skb+0x109/0x2e0
[ 357.647835][T13307] __alloc_skb+0x109/0x2e0
[ 357.652265][T13307] netlink_ack+0x23b/0x940
[ 357.656695][T13307] ? __rcu_read_unlock+0x4d/0x70
[ 357.661677][T13307] netlink_rcv_skb+0x18f/0x220
[ 357.666488][T13307] ? genl_bind+0x1b0/0x1b0
[ 357.671054][T13307] genl_rcv+0x28/0x40
[ 357.675056][T13307] netlink_unicast+0x56f/0x640
[ 357.679934][T13307] netlink_sendmsg+0x665/0x770
[ 357.684727][T13307] ? netlink_getsockopt+0x3e0/0x3e0
[ 357.689974][T13307] ____sys_sendmsg+0x37c/0x4d0
[ 357.694756][T13307] __sys_sendmsg+0x1e9/0x270
[ 357.699491][T13307] __x64_sys_sendmsg+0x46/0x50
[ 357.704279][T13307] do_syscall_64+0x41/0xc0
[ 357.708837][T13307] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 357.714746][T13307] RIP: 0033:0x7f8850a0a389
[ 357.719165][T13307] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 357.738856][T13307] RSP: 002b:00007f884fd7d168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
07:18:47 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) (fail_nth: 6)
07:18:47 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) (fail_nth: 7)
[ 357.747274][T13307] RAX: ffffffffffffffda RBX: 00007f8850b29f80 RCX: 00007f8850a0a389
[ 357.755247][T13307] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000004
[ 357.763223][T13307] RBP: 00007f884fd7d1d0 R08: 0000000000000000 R09: 0000000000000000
[ 357.771262][T13307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 357.779246][T13307] R13: 00007ffda713e28f R14: 00007f884fd7d300 R15: 0000000000022000
[ 357.787249][T13307]
07:18:47 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x3f000000, 0x0, 0x0, 0x0)
07:18:47 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0) (fail_nth: 7)
07:18:47 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0) (fail_nth: 8)
[ 357.840089][T13319] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 357.869150][T13322] loop0: detected capacity change from 0 to 128
[ 357.897364][T13309] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 357.906801][T13325] FAULT_INJECTION: forcing a failure.
[ 357.906801][T13325] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 357.907089][T13326] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 357.919972][T13325] CPU: 1 PID: 13325 Comm: syz-executor.1 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0
[ 357.930876][T13328] loop3: detected capacity change from 0 to 128
[ 357.939273][T13325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023
[ 357.955730][T13325] Call Trace:
[ 357.959097][T13325]
[ 357.962090][T13325] dump_stack_lvl+0xda/0x130
[ 357.966729][T13325] dump_stack+0x15/0x20
[ 357.970911][T13325] should_fail_ex+0x21f/0x230
[ 357.975680][T13325] should_fail+0xb/0x10
[ 357.979871][T13325] should_fail_usercopy+0x1a/0x20
[ 357.984936][T13325] _copy_to_user+0x1e/0x90
[ 357.986332][T13326] FAULT_INJECTION: forcing a failure.
[ 357.986332][T13326] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 357.989361][T13325] simple_read_from_buffer+0xa0/0x110
[ 358.007835][T13325] proc_fail_nth_read+0xfc/0x140
[ 358.012816][T13325] ? proc_fault_inject_write+0x210/0x210
[ 358.018499][T13325] vfs_read+0x19f/0x5c0
[ 358.022699][T13325] ? __fget_files+0x1c4/0x200
[ 358.027417][T13325] ? mutex_lock+0xd/0x30
[ 358.031672][T13325] ksys_read+0xeb/0x1a0
[ 358.035972][T13325] __x64_sys_read+0x42/0x50
[ 358.040491][T13325] do_syscall_64+0x41/0xc0
[ 358.044919][T13325] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 358.050831][T13325] RIP: 0033:0x7fa73334309c
[ 358.055252][T13325] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48
[ 358.074914][T13325] RSP: 002b:00007fa732704160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 358.083435][T13325] RAX: ffffffffffffffda RBX: 00007fa7334b0f80 RCX: 00007fa73334309c
07:18:48 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x80040, 0x0, 0x0, 0x0)
[ 358.091410][T13325] RDX: 000000000000000f RSI: 00007fa7327041e0 RDI: 0000000000000007
[ 358.099396][T13325] RBP: 00007fa7327041d0 R08: 0000000000000000 R09: 0000000000000000
[ 358.107378][T13325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 358.115463][T13325] R13: 00007ffd52bc863f R14: 00007fa732704300 R15: 0000000000022000
[ 358.123449][T13325]
[ 358.126471][T13326] CPU: 0 PID: 13326 Comm: syz-executor.5 Not tainted 6.4.0-syzkaller-12415-g8fc3b8f082cc #0
[ 358.136605][T13326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023
[ 358.146708][T13326] Call Trace:
[ 358.150015][T13326]
[ 358.153036][T13326] dump_stack_lvl+0xda/0x130
[ 358.157692][T13326] dump_stack+0x15/0x20
[ 358.161923][T13326] should_fail_ex+0x21f/0x230
[ 358.166631][T13326] should_fail+0xb/0x10
[ 358.170796][T13326] should_fail_usercopy+0x1a/0x20
[ 358.175868][T13326] _copy_to_user+0x1e/0x90
[ 358.180294][T13326] simple_read_from_buffer+0xa0/0x110
[ 358.185687][T13326] proc_fail_nth_read+0xfc/0x140
[ 358.190633][T13326] ? proc_fault_inject_write+0x210/0x210
[ 358.196316][T13326] vfs_read+0x19f/0x5c0
[ 358.200538][T13326] ? __fget_files+0x1c4/0x200
[ 358.205291][T13326] ? mutex_lock+0xd/0x30
[ 358.209542][T13326] ksys_read+0xeb/0x1a0
[ 358.213714][T13326] __x64_sys_read+0x42/0x50
[ 358.218233][T13326] do_syscall_64+0x41/0xc0
[ 358.222657][T13326] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 358.228603][T13326] RIP: 0033:0x7f88509bc09c
[ 358.233038][T13326] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48
[ 358.252667][T13326] RSP: 002b:00007f884fd7d160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 358.261121][T13326] RAX: ffffffffffffffda RBX: 00007f8850b29f80 RCX: 00007f88509bc09c
[ 358.269114][T13326] RDX: 000000000000000f RSI: 00007f884fd7d1e0 RDI: 0000000000000003
[ 358.277092][T13326] RBP: 00007f884fd7d1d0 R08: 0000000000000000 R09: 0000000000000000
[ 358.285135][T13326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
07:18:48 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:48 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:48 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
[ 358.293108][T13326] R13: 00007ffda713e28f R14: 00007f884fd7d300 R15: 0000000000022000
[ 358.301085][T13326]
07:18:48 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x40000800, 0x0, 0x0, 0x0)
07:18:48 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
[ 358.347389][T13338] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 358.411820][T13345] loop0: detected capacity change from 0 to 128
[ 358.443026][T13347] loop3: detected capacity change from 0 to 128
07:18:48 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:48 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400ee", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:48 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:48 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38002, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:48 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=")
syz_clone(0x1100, 0x0, 0x46030000, 0x0, 0x0, 0x0)
07:18:48 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x200000, 0x0, 0x0, 0x0)
07:18:48 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x3, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:48 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38004, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:48 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fff", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:48 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x4, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
[ 358.695941][T13363] loop0: detected capacity change from 0 to 128
[ 358.713191][T13368] loop3: detected capacity change from 0 to 128
07:18:48 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38009, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:48 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x5, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:49 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x3800f, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:49 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:49 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x93000000, 0x0, 0x0, 0x0)
07:18:49 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fff", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:49 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x6, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:49 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x300000, 0x0, 0x0, 0x0)
07:18:49 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0xf, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:49 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x7, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
[ 359.516543][T13387] __nla_validate_parse: 8 callbacks suppressed
[ 359.516560][T13387] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 359.532318][T13386] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'.
07:18:49 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x10, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:49 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fff", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:49 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x18, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
[ 359.568398][T13394] loop3: detected capacity change from 0 to 128
[ 359.586631][T13396] loop0: detected capacity change from 0 to 128
07:18:49 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x8, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:49 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x140, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
[ 359.629201][T13400] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 359.660507][T13404] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 359.687927][T13408] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'.
07:18:50 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:50 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0xec0, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:50 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x9, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:50 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff0000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:50 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x95000000, 0x0, 0x0, 0x0)
07:18:50 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x400000, 0x0, 0x0, 0x0)
07:18:50 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x33fe0, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
[ 360.432698][T13417] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 360.444166][T13421] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'.
07:18:50 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xa, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:50 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff0000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:50 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0xfffffdef, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
[ 360.480694][T13427] loop3: detected capacity change from 0 to 128
[ 360.495370][T13428] loop0: detected capacity change from 0 to 128
07:18:50 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x10, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:50 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xb, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
[ 360.535115][T13431] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 360.546267][T13432] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 360.588163][T13439] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'.
07:18:51 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xc, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:51 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:51 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0xbc030000, 0x0, 0x0, 0x0)
07:18:51 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x11, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:51 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff0000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:51 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x7f0000, 0x0, 0x0, 0x0)
07:18:51 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x12, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:51 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xd, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:51 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:51 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x13, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:51 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xe, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:51 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
[ 361.361012][T13458] loop0: detected capacity change from 0 to 128
[ 361.373207][T13462] loop3: detected capacity change from 0 to 128
07:18:51 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x14, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:52 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:52 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:52 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xf, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:52 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0xc7000000, 0x0, 0x0, 0x0)
07:18:52 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x15, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:52 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x80ffff, 0x0, 0x0, 0x0)
07:18:52 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x10, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:52 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
socket(0x10, 0x3, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:52 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x16, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:52 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x18, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:52 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x11, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
[ 362.252562][T13495] loop0: detected capacity change from 0 to 128
[ 362.260050][T13489] loop3: detected capacity change from 0 to 128
07:18:52 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x19, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:53 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x1a, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:53 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:53 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=")
syz_clone(0x1100, 0x0, 0xda030000, 0x0, 0x0, 0x0)
07:18:53 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
socket(0x10, 0x3, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:53 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x12, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:53 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0xf0ff1f, 0x0, 0x0, 0x0)
07:18:53 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x1c, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:53 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x25, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:53 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
socket(0x10, 0x3, 0x0)
r1 = socket$nl_route(0x10, 0x3, 0x0)
r2 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d0000000000000000ffffffff0800070001"], 0x6c}}, 0x0)
07:18:53 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x1d, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
[ 363.106424][T13521] loop0: detected capacity change from 0 to 128
[ 363.128576][T13525] loop3: detected capacity change from 0 to 128
07:18:53 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2e, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:53 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x1e, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:53 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, 0x0, 0x0)
07:18:54 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:54 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x48, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:54 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x1000000, 0x0, 0x0, 0x0)
07:18:54 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0xe3030000, 0x0, 0x0, 0x0)
07:18:54 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, 0x0, 0x0)
07:18:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x21, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x22, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:54 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x4c, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:54 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x24, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:54 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:54 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, 0x0, 0x0)
07:18:54 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x60, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
[ 363.986300][T13557] loop3: detected capacity change from 0 to 128
[ 363.993868][T13559] loop0: detected capacity change from 0 to 128
07:18:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x25, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:54 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x2000000, 0x0, 0x0, 0x0)
07:18:54 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0)
07:18:54 executing program 2:
bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x26, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:54 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x68, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:54 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0)
07:18:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x28, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:54 executing program 2:
bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:54 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x6c, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:54 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0)
07:18:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x29, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:54 executing program 2:
bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
[ 364.309569][T13596] loop3: detected capacity change from 0 to 128
[ 364.319020][T13597] loop0: detected capacity change from 0 to 128
07:18:54 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x4000000, 0x0, 0x0, 0x0)
07:18:54 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0xfbffffff, 0x0, 0x0, 0x0)
07:18:54 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x74, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:54 executing program 2:
r0 = socket$inet(0x2, 0x0, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:54 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0)
07:18:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x2a, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:54 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x7a, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x2c, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:54 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x6c}}, 0x0)
07:18:54 executing program 2:
r0 = socket$inet(0x2, 0x0, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
[ 364.570641][T13623] __nla_validate_parse: 38 callbacks suppressed
[ 364.570655][T13623] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'.
[ 364.595023][T13626] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 364.605892][T13627] loop3: detected capacity change from 0 to 128
07:18:54 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x300, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
[ 364.616259][T13629] loop0: detected capacity change from 0 to 128
07:18:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x2d, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
[ 364.648710][T13630] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'.
[ 364.691564][T13640] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'.
[ 364.715818][T13641] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'.
07:18:54 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x6040000, 0x0, 0x0, 0x0)
07:18:54 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=")
syz_clone(0x1100, 0x0, 0xff8f0000, 0x0, 0x0, 0x0)
07:18:54 executing program 2:
r0 = socket$inet(0x2, 0x0, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x2e, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:54 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x6c}}, 0x0)
07:18:54 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x500, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
[ 364.816653][T13653] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'.
[ 364.825398][T13652] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'.
[ 364.835946][T13650] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'.
07:18:54 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x30, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:54 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x600, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:54 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:55 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x6c}}, 0x0)
07:18:55 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
[ 364.869780][T13659] loop0: detected capacity change from 0 to 128
[ 364.898404][T13663] loop3: detected capacity change from 0 to 128
07:18:55 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x31, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
[ 364.952145][T13666] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'.
[ 364.963294][T13669] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.5'.
07:18:55 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:55 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x618, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:55 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32], 0x6c}}, 0x0)
07:18:55 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x7000000, 0x0, 0x0, 0x0)
07:18:55 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0xffefff1f, 0x0, 0x0, 0x0)
07:18:55 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x32, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:55 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, 0x0, 0x0)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:55 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, 0x0, 0x0)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:55 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, 0x0, 0x0)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:55 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200), 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:55 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200), 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:55 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x700, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:55 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x34, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:55 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32], 0x6c}}, 0x0)
07:18:55 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200), 0x10)
connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
[ 365.148359][T13699] loop3: detected capacity change from 0 to 128
[ 365.186710][T13703] loop0: detected capacity change from 0 to 128
07:18:55 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x8000000, 0x0, 0x0, 0x0)
07:18:55 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x3a, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:55 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x900, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:55 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:55 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0xffff8000, 0x0, 0x0, 0x0)
07:18:55 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32], 0x6c}}, 0x0)
07:18:55 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x3e, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:55 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xa00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:55 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x42, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:55 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x43, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:55 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xb00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:55 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x48, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
[ 365.399716][T13734] loop3: detected capacity change from 0 to 128
[ 365.434079][T13741] loop0: detected capacity change from 0 to 128
07:18:55 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0xf000000, 0x0, 0x0, 0x0)
07:18:55 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB], 0x6c}}, 0x0)
07:18:55 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x49, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
[ 365.632614][T13756] loop0: detected capacity change from 0 to 128
07:18:56 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:56 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xc00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:56 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0xfffffff5, 0x0, 0x0, 0x0)
07:18:56 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x4a, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:56 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB], 0x6c}}, 0x0)
07:18:56 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x10000200, 0x0, 0x0, 0x0)
07:18:56 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x4e, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:56 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB], 0x6c}}, 0x0)
07:18:56 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xd00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:56 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x4f, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:56 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xe00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:56 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x50, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
[ 366.252661][T13773] loop3: detected capacity change from 0 to 128
[ 366.260471][T13774] loop0: detected capacity change from 0 to 128
07:18:57 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2"], 0x6c}}, 0x0)
07:18:57 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x11000000, 0x0, 0x0, 0x0)
07:18:57 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0xf00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:57 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x51, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:57 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0xfffffffb, 0x0, 0x0, 0x0)
07:18:57 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:57 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x52, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:57 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x54, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:57 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x1100, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:57 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2"], 0x6c}}, 0x0)
07:18:57 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x7b, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
[ 367.113507][T13807] loop0: detected capacity change from 0 to 128
[ 367.125173][T13806] loop3: detected capacity change from 0 to 128
07:18:57 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x1200, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:57 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x2, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
[ 367.157093][T13813] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=123 sclass=netlink_route_socket pid=13813 comm=syz-executor.1
07:18:58 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(r0, 0x0, 0x0)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:58 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x3, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:58 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2"], 0x6c}}, 0x0)
07:18:58 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x1806, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:58 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=")
syz_clone(0x1100, 0x0, 0x13000000, 0x0, 0x0, 0x0)
07:18:58 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x403b7f0000, 0x0, 0x0, 0x0)
07:18:58 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x300, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:58 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x0, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:58 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2428, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:58 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff000000180005801400020000"], 0x6c}}, 0x0)
07:18:58 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x2, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:58 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2500, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
[ 367.990545][T13839] loop0: detected capacity change from 0 to 128
[ 367.996676][T13841] loop3: detected capacity change from 0 to 128
07:18:58 executing program 2:
r0 = socket$inet(0x2, 0x2, 0x0)
bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10)
connect$inet(r0, 0x0, 0x0)
setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x6, 0x4)
write$binfmt_elf64(r0, 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001840), 0x27148e3ad6f70ee, 0x0, 0x0)
07:18:58 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2824, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:58 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x4, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:58 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff000000180005801400020000"], 0x6c}}, 0x0)
07:18:58 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x80000000000, 0x0, 0x0, 0x0)
07:18:58 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$eJzs28tOE2EYxvGHgnISqCcUNrzRDW4mijdgQyAxNtEgNR4SkyEdtGltSaeJLTGxa914EbohunNnYrwB7sIdMTGsWDmmnYKFgge0J/n/Nt9Lnhn6Td9vmm8xs3H31ZP0su8suwVFekx9UllbUlQR9SrUUxsj1fq46pV16U1y88Xte/dvxOLxuQWz+dji1RkzG536+PTZ2wufCsN33o9+6Nd69OHG15nP6+PrExvfFh+nfEv5ls0VzLWlXK7gLmU8S6b8tGN2K+O5vmeprO/ld+XLmdzKSsncbHJkaCXv+b65KlnaK1khZ4V8ydxHbiprjuPYyJDwK4m1hQU31u5ZoLny+Zg7K2myIUmstWVCAACgrbp+/5893P7/WpO+z44R+Z2D2P8fBZX9/4PdSyIIB/b/AAAAAAAAAAAAAAAAAAAAAAB0g60gGAuCYGx7PCZV3/AJan8PShqSNCzphKQRSaOSxiRNSTop6ZSk05LOSDobnq5zks5Lmqj7X+2+VjT6m/5H9++/xul/1/iz/gf0/z/T5Pt/sPYx9L9D1b24OyB9KRcTxUQ4hvn89fjcZauK/jhrs1hM9O7kV8Lcduf91XVTyWf25pVFlhjQ9MUwr2SzN+N7zp9UsgXXf9Q5tmPf/jqO2bSkxjys6tZHZTtYbW2Y92myr6WXgkN4XRvzfmk17WYy3kHFu5eSX1rtkcoHHtONRfC8I6axbyF1xDR+WmwvpE6ZD8U/Ktr3m4TWabyRAQAAAAAAAAAAAAAAAADdoEWPiPIkOAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgo3wPAAD//5br++A=")
syz_clone(0x1100, 0x0, 0x1f000000, 0x0, 0x0, 0x0)
07:18:58 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x2e00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:59 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0x9, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:59 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff000000180005801400020000"], 0x6c}}, 0x0)
[ 368.865948][T13866] loop3: detected capacity change from 0 to 128
[ 368.872809][T13867] loop0: detected capacity change from 0 to 128
07:18:59 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x4800, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:59 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0})
sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x38000, &(0x7f0000000040)={&(0x7f0000000300)=@RTM_NEWMDB={0x38, 0x55, 0x1, 0xf, 0x0, {0x7, r3}, [@MDBA_SET_ENTRY={0x20, 0x1, {r5, 0x0, 0x0, 0x0, {@ip4=@multicast1=0xe0000307, 0x800}}}]}, 0x38}}, 0x0)
07:18:59 executing program 5:
r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff)
sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000600)={0x0, 0x4c00, &(0x7f00000005c0)={&(0x7f0000000440)={0x4c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SEC_KEY={0x2c, 0x2e, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0xffffffffffffffce, 0x4, "e48dad941d0da8dd273971d90cc0d495"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8}]}]}]}, 0x4c}}, 0x0)
07:18:59 executing program 4:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413e850000000f00000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000600)='qdisc_destroy\x00', r0}, 0x10)
socket$netlink(0x10, 0x3, 0x0)
socket$packet(0x11, 0x3, 0x300)
r1 = socket(0x10, 0x3, 0x0)
r2 = socket$nl_route(0x10, 0x3, 0x0)
r3 = socket(0x10, 0x803, 0x0)
sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffff7fffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000024000b0e00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000003c000200000000000000000000000000a2c234a0a516a896ff00000018000580140002000000007d00000000000000"], 0x6c}}, 0x0)
07:18:59 executing program 0:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x1fe00000, 0x0, 0x0, 0x0)
07:18:59 executing program 3:
madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa)
syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000200)='./file2\x00', 0x4080, &(0x7f0000000100)={[{@fat=@allow_utime}, {@dots}, {@dots}, {@nodots}, {@nodots}, {@fat=@errors_continue}, {@fat=@discard}]}, 0x1, 0x284, &(0x7f0000000500)="$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")
syz_clone(0x1100, 0x0, 0x40573b7f0000, 0x0, 0x0, 0x0)
07:18:59 executing program 1:
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket(0x200000000000011, 0x2, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0})
bind$packet(r1, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14)
getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff,