0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:44 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 305.562761][T14361] loop3: detected capacity change from 0 to 264192 [ 305.621708][T14361] loop3: p1 p2 p3 p4 [ 305.637808][T14361] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 305.658238][T14361] loop3: p3 size 1912633224 extends beyond EOD, truncated 06:14:44 executing program 3: sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 305.946199][T14378] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 306.091029][T14378] 8021q: adding VLAN 0 to HW filter on device bond53 [ 306.102935][T14379] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 306.124051][T14400] loop2: detected capacity change from 0 to 1 [ 306.230667][T14400] Dev loop2: unable to read RDB block 1 [ 306.237376][T14400] loop2: unable to read partition table [ 306.305384][T14379] 8021q: adding VLAN 0 to HW filter on device bond60 [ 306.383574][T14400] loop2: partition table beyond EOD, truncated [ 306.390016][T14400] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 06:14:45 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 306.664885][T14460] loop3: detected capacity change from 0 to 264192 06:14:45 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 306.739877][T14460] loop3: p1 p2 p3 p4 [ 306.753441][T14460] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 306.776893][T14460] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 306.950152][T14471] loop2: detected capacity change from 0 to 1 [ 307.016641][T14471] Dev loop2: unable to read RDB block 1 [ 307.022637][T14471] loop2: unable to read partition table [ 307.040615][T14471] loop2: partition table beyond EOD, truncated [ 307.047360][T14471] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 307.055459][T14482] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 307.088758][T14482] 8021q: adding VLAN 0 to HW filter on device bond54 06:14:46 executing program 3: sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 307.351701][T14518] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 307.421211][T14518] 8021q: adding VLAN 0 to HW filter on device bond61 06:14:46 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 307.909451][T14555] loop3: detected capacity change from 0 to 264192 [ 307.993119][T14564] loop2: detected capacity change from 0 to 1 [ 308.018431][T14555] loop3: p1 p2 p3 p4 [ 308.045056][T14564] Dev loop2: unable to read RDB block 1 [ 308.050869][T14564] loop2: unable to read partition table [ 308.053686][T14563] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 308.077388][T14564] loop2: partition table beyond EOD, truncated [ 308.084347][T14564] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 308.097160][T14555] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 308.149993][T14555] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 308.300178][T14563] 8021q: adding VLAN 0 to HW filter on device bond62 [ 308.316418][T14566] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 308.404641][T14566] 8021q: adding VLAN 0 to HW filter on device bond55 06:14:47 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:47 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:47 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 309.070768][T14655] loop2: detected capacity change from 0 to 1 [ 309.087641][T14656] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 309.156275][T14656] 8021q: adding VLAN 0 to HW filter on device bond63 [ 309.188214][T14655] Dev loop2: unable to read RDB block 1 [ 309.194249][T14655] loop2: unable to read partition table [ 309.216184][T14655] loop2: partition table beyond EOD, truncated [ 309.223671][T14655] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 309.358576][T14699] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 309.396422][T14700] loop3: detected capacity change from 0 to 1 [ 309.471469][T14699] 8021q: adding VLAN 0 to HW filter on device bond56 [ 309.495520][T14700] loop3: p1 p2 p3 p4 [ 309.499786][T14700] loop3: partition table partially beyond EOD, truncated [ 309.507946][T14700] loop3: p1 start 1 is beyond EOD, truncated [ 309.515754][T14700] loop3: p2 size 1073741824 extends beyond EOD, truncated 06:14:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:48 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ff", 0x20, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 309.700361][T14700] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 309.750484][T14700] loop3: p4 size 32768 extends beyond EOD, truncated 06:14:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 310.065688][T14750] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 310.070551][T14751] loop2: detected capacity change from 0 to 1 [ 310.198387][T14750] 8021q: adding VLAN 0 to HW filter on device bond64 06:14:49 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 310.244604][T14751] Dev loop2: unable to read RDB block 1 [ 310.250436][T14751] loop2: unable to read partition table [ 310.314833][T14751] loop2: partition table beyond EOD, truncated [ 310.321270][T14751] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 310.346635][ T4685] Dev loop2: unable to read RDB block 1 [ 310.352818][ T4685] loop2: unable to read partition table [ 310.373405][ T4685] loop2: partition table beyond EOD, truncated [ 310.574137][T14793] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:14:49 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:49 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ff", 0x20, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 310.845557][T14793] 8021q: adding VLAN 0 to HW filter on device bond57 06:14:49 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:49 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 311.167262][T14838] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 311.260253][T14852] loop2: detected capacity change from 0 to 1 [ 311.357026][T14838] 8021q: adding VLAN 0 to HW filter on device bond65 [ 311.368690][T14878] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 311.387968][T14852] Dev loop2: unable to read RDB block 1 [ 311.394088][T14852] loop2: unable to read partition table [ 311.432620][T14878] 8021q: adding VLAN 0 to HW filter on device bond58 [ 311.524887][T14852] loop2: partition table beyond EOD, truncated [ 311.531252][T14852] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 06:14:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:50 executing program 3: syz_read_part_table(0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:50 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ff", 0x20, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:50 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 312.208767][T14926] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 312.336398][T14926] 8021q: adding VLAN 0 to HW filter on device bond66 [ 312.350548][T14932] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 312.368516][T14935] loop2: detected capacity change from 0 to 1 [ 312.433649][T14932] 8021q: adding VLAN 0 to HW filter on device bond59 [ 312.520673][T14935] Dev loop2: unable to read RDB block 1 [ 312.527306][T14935] loop2: unable to read partition table 06:14:51 executing program 3: syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 312.649654][T14935] loop2: partition table beyond EOD, truncated [ 312.657316][T14935] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 06:14:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x0, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:51 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030", 0x30, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 313.257494][T15020] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 313.313997][T15020] 8021q: adding VLAN 0 to HW filter on device bond60 [ 313.351360][T15023] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:14:52 executing program 3: syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 313.468696][T15023] bond67 (uninitialized): Released all slaves [ 313.634193][T15063] loop2: detected capacity change from 0 to 1 [ 313.719699][T15063] Dev loop2: unable to read RDB block 1 [ 313.725991][T15063] loop2: unable to read partition table [ 313.763611][T15063] loop2: partition table beyond EOD, truncated [ 313.770382][T15063] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 06:14:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x0, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 314.091533][T15075] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 314.108453][T15075] bond67 (uninitialized): Released all slaves 06:14:52 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030", 0x30, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:52 executing program 3: syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 314.314108][T15079] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:14:53 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x0, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 314.393395][T15079] 8021q: adding VLAN 0 to HW filter on device bond61 [ 314.684279][T15121] bond67 (uninitialized): Released all slaves [ 314.760373][T15126] loop2: detected capacity change from 0 to 1 06:14:53 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:53 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 314.888525][T15126] Dev loop2: unable to read RDB block 1 [ 314.894580][T15126] loop2: unable to read partition table 06:14:53 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 314.933119][T15126] loop2: partition table beyond EOD, truncated [ 314.939607][T15126] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 315.126477][T15133] validate_nla: 1 callbacks suppressed [ 315.126543][T15133] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 315.191928][T15133] bond67 (uninitialized): Released all slaves 06:14:53 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030", 0x30, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 315.339425][T15137] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 315.389153][T15140] loop3: detected capacity change from 0 to 1 [ 315.430793][T15137] 8021q: adding VLAN 0 to HW filter on device bond62 [ 315.476548][T15140] Dev loop3: unable to read RDB block 1 [ 315.483316][T15140] loop3: unable to read partition table [ 315.531479][T15140] loop3: partition table beyond EOD, truncated [ 315.538495][T15140] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 315.562278][T15178] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 315.588026][T15178] bond67 (uninitialized): Released all slaves 06:14:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 315.786762][T15183] loop2: detected capacity change from 0 to 1 [ 315.906945][T15183] Dev loop2: unable to read RDB block 1 [ 315.912985][T15183] loop2: unable to read partition table 06:14:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 315.970332][T15183] loop2: partition table beyond EOD, truncated [ 315.977245][T15183] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 06:14:54 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:54 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 316.257110][T15189] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 316.296491][T15189] bond67 (uninitialized): Released all slaves [ 316.395989][T15194] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 316.470265][T15194] 8021q: adding VLAN 0 to HW filter on device bond63 [ 316.503529][T15196] loop3: detected capacity change from 0 to 1 06:14:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 316.626614][T15196] Dev loop3: unable to read RDB block 1 [ 316.632849][T15196] loop3: unable to read partition table [ 316.672478][T15196] loop3: partition table beyond EOD, truncated [ 316.679111][T15196] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 316.720634][T15236] loop2: detected capacity change from 0 to 1 [ 316.759856][T15238] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 316.900924][T15238] 8021q: adding VLAN 0 to HW filter on device bond67 [ 316.926784][T15236] Dev loop2: unable to read RDB block 1 [ 316.932899][T15236] loop2: unable to read partition table [ 316.962508][T15236] loop2: partition table beyond EOD, truncated [ 316.969107][T15236] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 06:14:55 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:55 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:56 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:56 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 317.453089][T15282] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 317.519017][T15282] 8021q: adding VLAN 0 to HW filter on device bond64 [ 317.667323][T15321] loop3: detected capacity change from 0 to 1 [ 317.679113][T15324] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 317.717963][T15323] loop2: detected capacity change from 0 to 1 [ 317.775391][T15324] 8021q: adding VLAN 0 to HW filter on device bond68 [ 317.795457][T15321] Dev loop3: unable to read RDB block 1 [ 317.801276][T15321] loop3: unable to read partition table [ 317.823421][T15323] Dev loop2: unable to read RDB block 1 [ 317.829371][T15323] loop2: unable to read partition table [ 317.892952][T15321] loop3: partition table beyond EOD, truncated [ 317.899381][T15321] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 317.917137][T15323] loop2: partition table beyond EOD, truncated [ 317.926173][T15323] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 06:14:56 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x0, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:56 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:56 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:57 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 318.488965][T15373] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 318.534530][T15373] bond65 (uninitialized): Released all slaves [ 318.594923][T15375] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 318.650497][T15375] 8021q: adding VLAN 0 to HW filter on device bond69 06:14:57 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x0, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 318.787723][T15414] loop3: detected capacity change from 0 to 1 [ 318.788552][T15412] loop2: detected capacity change from 0 to 1 [ 318.850127][T15414] Dev loop3: unable to read RDB block 1 [ 318.856304][T15414] loop3: unable to read partition table [ 318.927738][T15412] Dev loop2: unable to read RDB block 1 [ 318.933828][T15412] loop2: unable to read partition table [ 318.968368][T15414] loop3: partition table beyond EOD, truncated [ 318.975481][T15414] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 318.984624][T15412] loop2: partition table beyond EOD, truncated [ 318.991088][T15412] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 06:14:57 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, 0x0, &(0x7f0000000340)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:57 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:57 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 319.357790][T15426] bond65 (uninitialized): Released all slaves 06:14:58 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 319.518575][T15429] 8021q: adding VLAN 0 to HW filter on device bond70 06:14:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x0, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:58 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 320.051158][T15470] loop3: detected capacity change from 0 to 1 [ 320.094141][T15470] Dev loop3: unable to read RDB block 1 [ 320.099940][T15470] loop3: unable to read partition table [ 320.109009][T15470] loop3: partition table beyond EOD, truncated [ 320.115875][T15470] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 06:14:59 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, 0x0, &(0x7f0000000340)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 320.389182][T15477] validate_nla: 2 callbacks suppressed [ 320.389261][T15477] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 320.478479][T15477] bond65 (uninitialized): Released all slaves [ 320.479929][T15481] loop2: detected capacity change from 0 to 1 [ 320.635391][T15481] Dev loop2: unable to read RDB block 1 [ 320.641193][T15481] loop2: unable to read partition table [ 320.695128][T15481] loop2: partition table beyond EOD, truncated [ 320.701559][T15481] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 320.788019][T15489] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 320.839986][T15489] 8021q: adding VLAN 0 to HW filter on device bond71 06:14:59 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:14:59 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:14:59 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, 0x0, &(0x7f0000000340)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 321.451420][T15527] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 321.495006][T15531] loop3: detected capacity change from 0 to 1 [ 321.506679][T15527] bond65 (uninitialized): Released all slaves [ 321.579987][T15540] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 321.606455][T15531] Dev loop3: unable to read RDB block 1 [ 321.612701][T15531] loop3: unable to read partition table [ 321.631779][T15535] loop2: detected capacity change from 0 to 1 [ 321.673932][T15531] loop3: partition table beyond EOD, truncated [ 321.680471][T15531] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 321.736661][T15540] 8021q: adding VLAN 0 to HW filter on device bond72 [ 321.787707][T15535] Dev loop2: unable to read RDB block 1 [ 321.793645][T15535] loop2: unable to read partition table [ 321.812705][T15535] loop2: partition table beyond EOD, truncated [ 321.819299][T15535] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 06:15:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 321.833567][ T4685] Dev loop2: unable to read RDB block 1 [ 321.839362][ T4685] loop2: unable to read partition table [ 321.873240][ T4685] loop2: partition table beyond EOD, truncated 06:15:00 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:00 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ff", 0x20, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 322.323722][T15582] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 322.392753][T15582] bond65 (uninitialized): Released all slaves [ 322.549892][T15588] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 322.632047][T15588] 8021q: adding VLAN 0 to HW filter on device bond73 [ 322.729605][T15591] loop2: detected capacity change from 0 to 1 [ 322.833521][T15630] loop3: detected capacity change from 0 to 1 [ 322.868475][T15630] Dev loop3: unable to read RDB block 1 [ 322.874458][T15630] loop3: unable to read partition table [ 322.893176][T15591] Dev loop2: unable to read RDB block 1 [ 322.899127][T15591] loop2: unable to read partition table [ 322.970856][T15630] loop3: partition table beyond EOD, truncated [ 322.981829][T15630] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 323.000405][T15591] loop2: partition table beyond EOD, truncated [ 323.007559][T15591] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 324.127858][T15628] IPVS: ftp: loaded support on port[0] = 21 [ 324.719729][T15628] chnl_net:caif_netlink_parms(): no params data found [ 325.053930][T15628] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.061366][T15628] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.106048][T15628] device bridge_slave_0 entered promiscuous mode [ 325.158743][T15628] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.167657][T15628] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.178298][T15628] device bridge_slave_1 entered promiscuous mode [ 325.258512][T15628] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 325.310850][T15628] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 325.441771][T15628] team0: Port device team_slave_0 added [ 325.490876][T15628] team0: Port device team_slave_1 added [ 325.537283][ T3122] ieee802154 phy0 wpan0: encryption failed: -22 [ 325.544083][ T3122] ieee802154 phy1 wpan1: encryption failed: -22 [ 325.658750][T15628] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 325.665966][T15628] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 325.692919][T15628] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 325.768413][T15628] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 325.775961][T15628] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 325.802587][T15628] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 326.014426][T15628] device hsr_slave_0 entered promiscuous mode [ 326.066907][T15628] device hsr_slave_1 entered promiscuous mode [ 326.093742][ T4676] Bluetooth: hci4: command 0x0409 tx timeout [ 326.101201][T15628] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 326.109377][T15628] Cannot create hsr debugfs directory [ 326.593333][T15628] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 326.627100][T15628] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 326.675599][T15628] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 326.716343][T15628] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 327.238233][T15628] 8021q: adding VLAN 0 to HW filter on device bond0 [ 327.296334][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 327.305694][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 327.333958][T15628] 8021q: adding VLAN 0 to HW filter on device team0 [ 327.383835][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 327.396141][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 327.408649][T11178] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.416178][T11178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.485334][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 327.495515][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 327.505881][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 327.515505][ T9178] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.523034][ T9178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.532525][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 327.544124][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 327.574860][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 327.585875][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 327.644494][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 327.655317][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 327.666120][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 327.676817][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 327.687730][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 327.735193][T15628] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 327.748744][T15628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 327.796844][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 327.809035][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 327.848902][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 327.857024][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 327.904656][T15628] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 328.173101][ T8482] Bluetooth: hci4: command 0x041b tx timeout [ 328.338337][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 328.348859][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 328.460158][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 328.470646][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 328.515208][T15628] device veth0_vlan entered promiscuous mode [ 328.533276][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 328.543085][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 328.618470][T15628] device veth1_vlan entered promiscuous mode [ 328.806606][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 328.817367][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 328.859367][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 328.870442][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 328.889422][T15628] device veth0_macvtap entered promiscuous mode [ 328.945034][T15628] device veth1_macvtap entered promiscuous mode [ 329.084115][T15628] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 329.103243][T15628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 329.114022][T15628] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 329.124764][T15628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 329.134880][T15628] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 329.145552][T15628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 329.155616][T15628] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 329.166320][T15628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 329.180872][T15628] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 329.198206][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 329.210860][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 329.221058][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 329.231849][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 329.274184][T15628] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 329.286688][T15628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 329.296862][T15628] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 329.307516][T15628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 329.317579][T15628] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 329.328855][T15628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 329.338915][T15628] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 329.349565][T15628] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 329.364352][T15628] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 329.376816][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 329.387783][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 329.444380][T15628] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.455217][T15628] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.464355][T15628] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.473444][T15628] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.963393][ T727] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 329.971475][ T727] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 329.985836][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 330.050360][ T1290] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 330.059831][ T1290] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 330.069255][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 330.256620][ T8482] Bluetooth: hci4: command 0x040f tx timeout [ 330.346087][T15898] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 330.392275][T15898] 8021q: adding VLAN 0 to HW filter on device bond1 [ 330.428022][T15932] bond1: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 330.447301][T15932] bond1: (slave ip6tnl1): Error -95 calling set_mac_address 06:15:09 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:09 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:09 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:09 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ff", 0x20, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 331.214878][T15944] loop3: detected capacity change from 0 to 1 [ 331.248949][T15946] loop2: detected capacity change from 0 to 1 [ 331.270696][T15947] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 331.301591][T15947] bond65 (uninitialized): Released all slaves [ 331.318685][T15944] Dev loop3: unable to read RDB block 1 [ 331.326208][T15944] loop3: unable to read partition table [ 331.340225][T15946] Dev loop2: unable to read RDB block 1 [ 331.346238][T15946] loop2: unable to read partition table [ 331.358019][T15946] loop2: partition table beyond EOD, truncated [ 331.364665][T15946] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 331.378053][T15944] loop3: partition table beyond EOD, truncated [ 331.384868][T15944] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 331.405295][T15954] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 331.522961][T15954] 8021q: adding VLAN 0 to HW filter on device bond74 06:15:10 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 331.786433][T15995] loop4: detected capacity change from 0 to 1 06:15:10 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 331.907134][T15995] Dev loop4: unable to read RDB block 1 [ 331.913519][T15995] loop4: unable to read partition table 06:15:10 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ff", 0x20, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 331.992929][T15995] loop4: partition table beyond EOD, truncated [ 331.999284][T15995] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 06:15:10 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 332.248523][T16002] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:15:11 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 332.346422][T16002] 8021q: adding VLAN 0 to HW filter on device bond65 [ 332.363150][ T18] Bluetooth: hci4: command 0x0419 tx timeout [ 332.526475][T16040] loop2: detected capacity change from 0 to 1 [ 332.597208][T16042] loop3: detected capacity change from 0 to 1 [ 332.620985][T16050] loop4: detected capacity change from 0 to 1 [ 332.659555][T16040] Dev loop2: unable to read RDB block 1 [ 332.660315][T16042] Dev loop3: unable to read RDB block 1 [ 332.665916][T16040] loop2: unable to read partition table [ 332.671352][T16042] loop3: unable to read partition table [ 332.695071][T16050] Dev loop4: unable to read RDB block 1 [ 332.701989][T16050] loop4: unable to read partition table [ 332.731086][T16050] loop4: partition table beyond EOD, truncated [ 332.739087][T16050] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 332.758688][T16042] loop3: partition table beyond EOD, truncated [ 332.765368][T16042] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 332.799903][T16055] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 332.822162][T16040] loop2: partition table beyond EOD, truncated [ 332.828958][T16040] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 332.881006][T16055] 8021q: adding VLAN 0 to HW filter on device bond75 06:15:11 executing program 4: sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:11 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:12 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:12 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030", 0x30, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:12 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 333.724957][T16096] loop4: detected capacity change from 0 to 264192 [ 333.806949][T16096] loop4: p1 p2 p3 p4 [ 333.827407][T16096] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 333.847371][T16096] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 333.853661][T16101] loop2: detected capacity change from 0 to 1 [ 334.021437][T16110] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 334.055942][T16101] Dev loop2: unable to read RDB block 1 [ 334.061959][T16101] loop2: unable to read partition table [ 334.129627][T16110] 8021q: adding VLAN 0 to HW filter on device bond66 [ 334.177930][T16101] loop2: partition table beyond EOD, truncated [ 334.185268][T16101] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 334.239806][T16151] loop3: detected capacity change from 0 to 1 [ 334.336957][T16151] Dev loop3: unable to read RDB block 1 [ 334.342949][T16151] loop3: unable to read partition table [ 334.368907][T16159] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 334.386522][T16151] loop3: partition table beyond EOD, truncated [ 334.393622][T16151] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 334.557390][T16159] 8021q: adding VLAN 0 to HW filter on device bond76 06:15:13 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:13 executing program 4: sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:13 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030", 0x30, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:13 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:14 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 335.518459][T16199] loop2: detected capacity change from 0 to 1 [ 335.627254][T16205] loop4: detected capacity change from 0 to 264192 [ 335.651859][T16199] Dev loop2: unable to read RDB block 1 [ 335.660000][T16199] loop2: unable to read partition table [ 335.685096][T16205] loop4: p1 p2 p3 p4 [ 335.692041][T16205] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 335.721228][T16199] loop2: partition table beyond EOD, truncated [ 335.727935][T16199] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 335.821816][T16205] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 335.848618][T16213] loop3: detected capacity change from 0 to 1 [ 335.927719][T16213] Dev loop3: unable to read RDB block 1 [ 335.934103][T16213] loop3: unable to read partition table [ 336.046595][T16213] loop3: partition table beyond EOD, truncated [ 336.053682][T16213] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 336.056491][T16221] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 336.251573][T16221] 8021q: adding VLAN 0 to HW filter on device bond67 [ 336.267229][T16224] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 336.381930][T16224] 8021q: adding VLAN 0 to HW filter on device bond77 06:15:15 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:15 executing program 4: sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:15 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030", 0x30, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:15 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, 0x0, &(0x7f0000000340)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:15 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 337.080621][T16304] loop2: detected capacity change from 0 to 1 [ 337.174216][T16304] Dev loop2: unable to read RDB block 1 [ 337.180026][T16304] loop2: unable to read partition table [ 337.250194][T16304] loop2: partition table beyond EOD, truncated [ 337.257044][T16304] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 337.408561][T16314] loop3: detected capacity change from 0 to 1 [ 337.433703][T16313] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 337.459812][T16312] loop4: detected capacity change from 0 to 264192 [ 337.503901][T16314] Dev loop3: unable to read RDB block 1 [ 337.510033][T16314] loop3: unable to read partition table [ 337.586084][T16313] 8021q: adding VLAN 0 to HW filter on device bond68 [ 337.708976][T16312] loop4: p1 p2 p3 p4 [ 337.709646][T16314] loop3: partition table beyond EOD, truncated [ 337.719984][T16314] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 337.720460][T16312] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 337.744179][ T4685] Dev loop3: unable to read RDB block 1 [ 337.750140][ T4685] loop3: unable to read partition table [ 337.787206][ T4685] loop3: partition table beyond EOD, truncated [ 337.838877][T16312] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:15:16 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 338.041930][T16363] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 338.172845][T16363] 8021q: adding VLAN 0 to HW filter on device bond78 06:15:17 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:17 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, 0x0, &(0x7f0000000340)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:17 executing program 4: sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 06:15:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:17 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 338.964960][T16417] loop3: detected capacity change from 0 to 1 [ 339.015530][T16416] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 339.038796][T16417] Dev loop3: unable to read RDB block 1 [ 339.045101][T16417] loop3: unable to read partition table [ 339.103356][T16416] 8021q: adding VLAN 0 to HW filter on device bond69 [ 339.156203][T16417] loop3: partition table beyond EOD, truncated [ 339.163038][T16417] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 339.184752][ T4685] Dev loop3: unable to read RDB block 1 [ 339.190666][ T4685] loop3: unable to read partition table [ 339.229403][ T4685] loop3: partition table beyond EOD, truncated [ 339.330550][T16460] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:15:18 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 339.423456][T16461] loop4: detected capacity change from 0 to 264192 [ 339.453349][T16460] 8021q: adding VLAN 0 to HW filter on device bond79 06:15:18 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, 0x0, &(0x7f0000000340)) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 339.685923][T16461] loop4: p1 p2 p3 p4 [ 339.699785][T16461] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 339.753551][T16461] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:15:18 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 340.279897][T16520] loop3: detected capacity change from 0 to 1 06:15:19 executing program 4: sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 340.354313][T16520] Dev loop3: unable to read RDB block 1 [ 340.360889][T16520] loop3: unable to read partition table [ 340.395069][T16520] loop3: partition table beyond EOD, truncated [ 340.401928][T16520] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 340.431253][T16524] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 340.562224][T16524] 8021q: adding VLAN 0 to HW filter on device bond70 06:15:19 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 340.838601][T16567] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 340.933396][T16567] 8021q: adding VLAN 0 to HW filter on device bond80 06:15:19 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:20 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 341.330492][T16606] loop4: detected capacity change from 0 to 264192 [ 341.435612][T16606] loop4: p1 p2 p3 p4 [ 341.449989][T16606] loop4: p2 size 1073741824 extends beyond EOD, truncated 06:15:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 341.495426][T16606] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 341.629816][T16618] loop3: detected capacity change from 0 to 1 [ 341.675804][T16619] loop2: detected capacity change from 0 to 1 [ 341.746512][T16618] Dev loop3: unable to read RDB block 1 [ 341.752630][T16618] loop3: unable to read partition table [ 341.767680][T16619] loop2: p1 p2 p3 p4 [ 341.771990][T16619] loop2: partition table partially beyond EOD, truncated [ 341.780766][T16619] loop2: p1 start 1 is beyond EOD, truncated [ 341.787123][T16619] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 341.807540][T16631] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 341.839730][T16618] loop3: partition table beyond EOD, truncated [ 341.846384][T16618] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 341.954097][T16631] 8021q: adding VLAN 0 to HW filter on device bond71 [ 342.048689][T16619] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 342.116730][T16619] loop2: p4 size 32768 extends beyond EOD, truncated [ 342.140517][T16671] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:15:20 executing program 4: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 342.203360][T16671] 8021q: adding VLAN 0 to HW filter on device bond81 06:15:21 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:21 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:21 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:21 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, 0x0, 0x0, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 342.973813][ T18] Bluetooth: hci0: command 0x0406 tx timeout [ 343.050370][T16717] loop4: detected capacity change from 0 to 1 [ 343.122834][T16722] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 343.157256][T16717] loop4: p1 p2 p3 p4 [ 343.161599][T16717] loop4: partition table partially beyond EOD, truncated [ 343.169760][T16717] loop4: p1 start 1 is beyond EOD, truncated [ 343.176061][T16717] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 343.193602][T16722] 8021q: adding VLAN 0 to HW filter on device bond82 [ 343.211705][T16721] loop3: detected capacity change from 0 to 1 [ 343.375762][T16721] Dev loop3: unable to read RDB block 1 [ 343.381711][T16721] loop3: unable to read partition table [ 343.398664][T16717] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 343.439005][T16717] loop4: p4 size 32768 extends beyond EOD, truncated [ 343.470231][T16721] loop3: partition table beyond EOD, truncated [ 343.477114][T16721] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 343.522156][T16765] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 343.621474][T16765] 8021q: adding VLAN 0 to HW filter on device bond72 06:15:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, 0x0, 0x0, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 343.825039][T16770] loop2: detected capacity change from 0 to 1 [ 343.959945][T16770] loop2: p1 p2 p3 p4 [ 343.964525][T16770] loop2: partition table partially beyond EOD, truncated [ 343.972155][T16770] loop2: p1 start 1 is beyond EOD, truncated [ 343.978640][T16770] loop2: p2 size 1073741824 extends beyond EOD, truncated 06:15:22 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:22 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) [ 344.181346][T16770] loop2: p3 size 1912633224 extends beyond EOD, truncated 06:15:23 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 344.238236][T16770] loop2: p4 size 32768 extends beyond EOD, truncated [ 344.406950][T16817] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 344.483418][T16817] 8021q: adding VLAN 0 to HW filter on device bond83 [ 344.607850][T16858] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 344.653285][T16858] 8021q: adding VLAN 0 to HW filter on device bond73 [ 344.667408][T16856] loop3: detected capacity change from 0 to 1 [ 344.733595][T16856] Dev loop3: unable to read RDB block 1 [ 344.739548][T16856] loop3: unable to read partition table [ 344.831560][T16856] loop3: partition table beyond EOD, truncated [ 344.838276][T16856] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 06:15:23 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, 0x0, 0x0, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:23 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:23 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:24 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) [ 345.533523][T16911] loop3: detected capacity change from 0 to 1 [ 345.654267][T16911] Dev loop3: unable to read RDB block 1 [ 345.660056][T16911] loop3: unable to read partition table [ 345.667657][T16913] loop2: detected capacity change from 0 to 1 [ 345.786634][T16911] loop3: partition table beyond EOD, truncated [ 345.795979][T16911] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 345.814288][ T4685] Dev loop3: unable to read RDB block 1 [ 345.820072][ T4685] loop3: unable to read partition table [ 345.841875][T16921] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 345.864472][ T4685] loop3: partition table beyond EOD, truncated [ 345.876486][T16913] loop2: p1 p2 p3 p4 [ 345.880635][T16913] loop2: partition table partially beyond EOD, truncated [ 345.888603][T16913] loop2: p1 start 1 is beyond EOD, truncated [ 345.896523][T16913] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 345.942939][T16921] 8021q: adding VLAN 0 to HW filter on device bond84 [ 346.001143][T16920] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 346.155995][T16913] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 346.239940][T16913] loop2: p4 size 32768 extends beyond EOD, truncated [ 346.306131][T16920] 8021q: adding VLAN 0 to HW filter on device bond74 06:15:25 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:25 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:25 executing program 4: syz_read_part_table(0x0, 0x0, 0x0) 06:15:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 347.016803][T17009] loop3: detected capacity change from 0 to 1 [ 347.048987][T17010] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 347.111761][T17017] loop2: detected capacity change from 0 to 1 [ 347.158063][T17009] Dev loop3: unable to read RDB block 1 [ 347.164229][T17009] loop3: unable to read partition table [ 347.179895][T17017] loop2: p1 p2 p3 p4 [ 347.184472][T17017] loop2: partition table partially beyond EOD, truncated [ 347.211028][T17010] 8021q: adding VLAN 0 to HW filter on device bond85 [ 347.240960][T17017] loop2: p1 start 1 is beyond EOD, truncated [ 347.247651][T17017] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 347.361554][T17062] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 347.377514][T17009] loop3: partition table beyond EOD, truncated [ 347.384860][T17009] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 347.423293][T17017] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 347.463841][T17062] 8021q: adding VLAN 0 to HW filter on device bond75 [ 347.609590][T17017] loop2: p4 size 32768 extends beyond EOD, truncated 06:15:26 executing program 4: syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) 06:15:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:26 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:26 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 348.470954][T17114] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 348.553111][T17114] 8021q: adding VLAN 0 to HW filter on device bond86 [ 348.608249][T17118] loop3: detected capacity change from 0 to 1 06:15:27 executing program 4: syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) [ 348.753472][T17157] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 348.796834][T17157] 8021q: adding VLAN 0 to HW filter on device bond76 [ 348.831277][T17118] Dev loop3: unable to read RDB block 1 [ 348.837407][T17118] loop3: unable to read partition table 06:15:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 348.945225][T17118] loop3: partition table beyond EOD, truncated [ 348.951655][T17118] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 06:15:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:28 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:28 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 349.508650][T17201] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 349.613262][T17201] 8021q: adding VLAN 0 to HW filter on device bond87 06:15:28 executing program 4: syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) [ 349.902896][T17242] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 350.017515][T17242] 8021q: adding VLAN 0 to HW filter on device bond77 06:15:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{0x0}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 350.231762][T17281] loop3: detected capacity change from 0 to 1 06:15:29 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 350.408900][T17281] Dev loop3: unable to read RDB block 1 [ 350.416327][T17281] loop3: unable to read partition table [ 350.487555][T17281] loop3: partition table beyond EOD, truncated [ 350.494937][T17281] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 350.632278][T17291] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:15:29 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 350.674112][T17291] 8021q: adding VLAN 0 to HW filter on device bond88 [ 350.818127][T17327] loop2: detected capacity change from 0 to 1 [ 350.889534][T17327] loop2: p1 p2 p3 p4 [ 350.895363][T17327] loop2: partition table partially beyond EOD, truncated [ 350.903292][T17327] loop2: p1 start 1 is beyond EOD, truncated [ 350.909628][T17327] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 350.925217][T17327] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 350.936244][T17327] loop2: p4 size 32768 extends beyond EOD, truncated 06:15:29 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 06:15:30 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:30 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{0x0}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 351.501342][T17342] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 351.581982][T17342] 8021q: adding VLAN 0 to HW filter on device bond78 [ 351.799132][T17380] loop4: detected capacity change from 0 to 1 [ 351.855524][T17380] Dev loop4: unable to read RDB block 1 [ 351.861319][T17380] loop4: unable to read partition table [ 351.886734][T17380] loop4: partition table beyond EOD, truncated [ 351.893822][T17380] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 351.941421][T17382] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 352.053344][T17382] 8021q: adding VLAN 0 to HW filter on device bond89 06:15:30 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 352.225787][T17422] loop2: detected capacity change from 0 to 1 [ 352.288993][T17422] loop2: p1 p2 p3 p4 [ 352.293367][T17422] loop2: partition table partially beyond EOD, truncated [ 352.301022][T17422] loop2: p1 start 1 is beyond EOD, truncated [ 352.308864][T17422] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 352.371170][T17428] loop3: detected capacity change from 0 to 1 [ 352.381359][T17422] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 352.395446][T17422] loop2: p4 size 32768 extends beyond EOD, truncated [ 352.430646][T17428] Dev loop3: unable to read RDB block 1 [ 352.436783][T17428] loop3: unable to read partition table [ 352.510669][T17428] loop3: partition table beyond EOD, truncated [ 352.517655][T17428] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) [ 352.561195][T17441] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 352.629415][T17441] 8021q: adding VLAN 0 to HW filter on device bond79 06:15:31 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 06:15:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{0x0}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:31 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:31 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, 0x0, 0x0, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 352.958605][T17479] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:15:31 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 353.085044][T17479] 8021q: adding VLAN 0 to HW filter on device bond90 [ 353.236088][T17516] loop2: detected capacity change from 0 to 1 [ 353.285280][T17516] loop2: p1 p2 p3 p4 [ 353.289429][T17516] loop2: partition table partially beyond EOD, truncated [ 353.297351][T17516] loop2: p1 start 1 is beyond EOD, truncated [ 353.303798][T17516] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 353.323800][T17516] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 353.353452][T17516] loop2: p4 size 32768 extends beyond EOD, truncated 06:15:32 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 353.550264][T17531] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 353.573227][T17532] loop4: detected capacity change from 0 to 1 06:15:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 353.717533][T17531] 8021q: adding VLAN 0 to HW filter on device bond80 [ 353.760030][T17532] Dev loop4: unable to read RDB block 1 [ 353.766130][T17532] loop4: unable to read partition table [ 353.811731][T17532] loop4: partition table beyond EOD, truncated [ 353.818748][T17532] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 354.046544][T17572] loop3: detected capacity change from 0 to 1 [ 354.118612][T17572] Dev loop3: unable to read RDB block 1 [ 354.124890][T17572] loop3: unable to read partition table [ 354.135373][T17578] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 354.173493][T17578] 8021q: adding VLAN 0 to HW filter on device bond91 [ 354.187827][T17572] loop3: partition table beyond EOD, truncated [ 354.195870][T17572] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 06:15:33 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 06:15:33 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, 0x0, 0x0, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 354.493168][T17615] loop2: detected capacity change from 0 to 1 [ 354.684478][T17615] loop2: p1 p2 p3 p4 [ 354.688770][T17615] loop2: partition table partially beyond EOD, truncated [ 354.697533][T17615] loop2: p1 start 1 is beyond EOD, truncated [ 354.706162][T17615] loop2: p2 size 1073741824 extends beyond EOD, truncated 06:15:33 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:33 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 354.931506][T17615] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 355.036073][T17615] loop2: p4 size 32768 extends beyond EOD, truncated [ 355.248772][T17627] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 355.286755][T17628] loop4: detected capacity change from 0 to 1 [ 355.389785][T17627] 8021q: adding VLAN 0 to HW filter on device bond81 [ 355.440296][T17628] Dev loop4: unable to read RDB block 1 [ 355.440351][T17634] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 355.455883][T17628] loop4: unable to read partition table [ 355.535779][T17634] 8021q: adding VLAN 0 to HW filter on device bond92 [ 355.714948][T17628] loop4: partition table beyond EOD, truncated [ 355.721288][T17628] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 06:15:34 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 355.822890][ T4685] Dev loop4: unable to read RDB block 1 [ 355.830306][ T4685] loop4: unable to read partition table [ 355.895836][ T4685] loop4: partition table beyond EOD, truncated [ 355.995785][T17712] loop3: detected capacity change from 0 to 1 [ 356.116577][T17712] Dev loop3: unable to read RDB block 1 [ 356.122668][T17712] loop3: unable to read partition table [ 356.153813][T17712] loop3: partition table beyond EOD, truncated [ 356.160170][T17712] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 06:15:34 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 06:15:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, 0x0, 0x0, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 356.496183][T17720] loop2: detected capacity change from 0 to 1 [ 356.576889][T17720] loop2: p1 p2 p3 p4 [ 356.581181][T17720] loop2: partition table partially beyond EOD, truncated [ 356.589073][T17720] loop2: p1 start 1 is beyond EOD, truncated [ 356.596374][T17720] loop2: p2 size 1073741824 extends beyond EOD, truncated 06:15:35 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 356.675750][T17720] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 356.705512][T17720] loop2: p4 size 32768 extends beyond EOD, truncated [ 356.975097][T17732] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:15:35 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 357.017460][T17738] loop4: detected capacity change from 0 to 1 [ 357.125623][T17732] 8021q: adding VLAN 0 to HW filter on device bond93 [ 357.138571][T17737] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 357.166789][T17738] Dev loop4: unable to read RDB block 1 [ 357.172802][T17738] loop4: unable to read partition table [ 357.195470][T17737] 8021q: adding VLAN 0 to HW filter on device bond82 [ 357.250406][T17738] loop4: partition table beyond EOD, truncated [ 357.257696][T17738] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 06:15:36 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 06:15:36 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:36 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 357.876909][T17821] loop2: detected capacity change from 0 to 1 [ 357.948267][T17821] loop2: p1 p2 p3 p4 [ 357.952623][T17821] loop2: partition table partially beyond EOD, truncated [ 357.960276][T17821] loop2: p1 start 1 is beyond EOD, truncated [ 357.966817][T17821] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 358.065706][T17821] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 358.075411][T17821] loop2: p4 size 32768 extends beyond EOD, truncated [ 358.333735][ T7] Bluetooth: hci1: command 0x0406 tx timeout [ 358.370439][T17841] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:15:37 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:37 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 358.433614][T17841] 8021q: adding VLAN 0 to HW filter on device bond94 [ 358.513933][T17844] loop4: detected capacity change from 0 to 1 [ 358.555457][T17845] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 358.671616][T17845] 8021q: adding VLAN 0 to HW filter on device bond83 [ 358.686157][T17844] Dev loop4: unable to read RDB block 1 [ 358.692072][T17844] loop4: unable to read partition table 06:15:37 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 358.779611][T17844] loop4: partition table beyond EOD, truncated [ 358.787000][T17844] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 358.807991][ T4685] Dev loop4: unable to read RDB block 1 [ 358.816047][ T4685] loop4: unable to read partition table [ 358.866182][ T4685] loop4: partition table beyond EOD, truncated [ 359.050607][T17918] loop2: detected capacity change from 0 to 1 06:15:37 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000), 0x0, 0x1c0}]) 06:15:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 359.125189][T17918] loop2: p1 p2 p3 p4 [ 359.129459][T17918] loop2: partition table partially beyond EOD, truncated [ 359.137463][T17918] loop2: p1 start 1 is beyond EOD, truncated [ 359.144320][T17918] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 359.350719][T17918] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 359.407081][T17933] loop4: detected capacity change from 0 to 1 [ 359.438287][T17930] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:15:38 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 359.469970][T17918] loop2: p4 size 32768 extends beyond EOD, truncated [ 359.546383][T17933] Dev loop4: unable to read RDB block 1 [ 359.552187][T17933] loop4: unable to read partition table [ 359.605028][T17930] 8021q: adding VLAN 0 to HW filter on device bond95 [ 359.682075][T17933] loop4: partition table beyond EOD, truncated [ 359.690006][T17933] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 359.788075][T17956] loop3: detected capacity change from 0 to 1 06:15:38 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ff", 0x20, 0x1c0}]) 06:15:38 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 359.944626][T17956] loop3: p1 p2 p3 p4 [ 359.948909][T17956] loop3: partition table partially beyond EOD, truncated [ 359.957463][T17956] loop3: p1 start 1 is beyond EOD, truncated [ 359.963900][T17956] loop3: p2 size 1073741824 extends beyond EOD, truncated 06:15:38 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 360.059441][T17989] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 360.081185][T17956] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 360.137619][T17989] 8021q: adding VLAN 0 to HW filter on device bond84 [ 360.207775][T17956] loop3: p4 size 32768 extends beyond EOD, truncated [ 360.270545][ T4685] loop3: p1 p2 p3 p4 [ 360.275064][ T4685] loop3: partition table partially beyond EOD, truncated [ 360.282830][ T4685] loop3: p1 start 1 is beyond EOD, truncated [ 360.288994][ T4685] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 360.381005][ T4685] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 360.426896][ T4685] loop3: p4 size 32768 extends beyond EOD, truncated 06:15:39 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:39 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) [ 360.576173][T18035] loop4: detected capacity change from 0 to 1 06:15:39 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 361.075214][T18035] Dev loop4: unable to read RDB block 1 [ 361.081021][T18035] loop4: unable to read partition table [ 361.094383][T18045] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 361.105988][T18035] loop4: partition table beyond EOD, truncated [ 361.112731][T18035] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 361.176667][T18046] loop2: detected capacity change from 0 to 1 [ 361.257811][T18046] loop2: p1 p2 p3 p4 [ 361.262241][T18046] loop2: partition table partially beyond EOD, truncated [ 361.264328][T18045] 8021q: adding VLAN 0 to HW filter on device bond96 [ 361.270445][T18046] loop2: p1 start 1 is beyond EOD, truncated [ 361.283624][T18046] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 361.305136][T18046] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 361.323763][T18046] loop2: p4 size 32768 extends beyond EOD, truncated [ 361.477928][T18090] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:15:40 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, 0x0, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 361.687163][T18090] 8021q: adding VLAN 0 to HW filter on device bond85 [ 361.722058][T18123] loop3: detected capacity change from 0 to 1 [ 361.786429][T18123] loop3: p1 p2 p3 p4 [ 361.790840][T18123] loop3: partition table partially beyond EOD, truncated [ 361.798871][T18123] loop3: p1 start 1 is beyond EOD, truncated [ 361.805204][T18123] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 361.820661][T18123] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 361.833733][T18123] loop3: p4 size 32768 extends beyond EOD, truncated 06:15:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{0x0}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 362.214701][T18147] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 362.305944][T18147] 8021q: adding VLAN 0 to HW filter on device bond97 06:15:41 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:41 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ff", 0x20, 0x1c0}]) [ 362.500315][T18184] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:15:41 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 362.567335][T18184] 8021q: adding VLAN 0 to HW filter on device bond86 06:15:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, 0x0, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 362.986082][T18221] loop4: detected capacity change from 0 to 1 [ 363.066873][T18221] Dev loop4: unable to read RDB block 1 [ 363.073769][T18221] loop4: unable to read partition table 06:15:41 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{0x0}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 363.151246][T18221] loop4: partition table beyond EOD, truncated [ 363.159719][T18221] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 363.305068][T18226] loop3: detected capacity change from 0 to 1 [ 363.391731][T18230] loop2: detected capacity change from 0 to 1 [ 363.425081][T18226] loop3: p1 p2 p3 p4 [ 363.429412][T18226] loop3: partition table partially beyond EOD, truncated [ 363.437378][T18226] loop3: p1 start 1 is beyond EOD, truncated [ 363.443762][T18226] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 363.454137][T18226] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 363.470287][T18226] loop3: p4 size 32768 extends beyond EOD, truncated [ 363.528133][T18230] loop2: p1 p2 p3 p4 [ 363.532597][T18230] loop2: partition table partially beyond EOD, truncated [ 363.540265][T18230] loop2: p1 start 1 is beyond EOD, truncated [ 363.546755][T18230] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 363.590458][T18240] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:15:42 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ff", 0x20, 0x1c0}]) [ 363.667367][T18230] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 363.757023][T18240] 8021q: adding VLAN 0 to HW filter on device bond98 [ 363.803984][T18230] loop2: p4 size 32768 extends beyond EOD, truncated 06:15:42 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 364.110942][T18292] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:15:42 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) [ 364.195930][T18292] 8021q: adding VLAN 0 to HW filter on device bond87 [ 364.338549][T18330] loop4: detected capacity change from 0 to 1 [ 364.360160][T18332] loop2: detected capacity change from 0 to 1 [ 364.405981][T18332] loop2: p1 p2 p3 p4 [ 364.410558][T18332] loop2: partition table partially beyond EOD, truncated [ 364.419499][T18332] loop2: p1 start 1 is beyond EOD, truncated [ 364.425927][T18332] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 364.427689][T18330] Dev loop4: unable to read RDB block 1 [ 364.442012][T18330] loop4: unable to read partition table [ 364.449798][T18332] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 364.462539][T18332] loop2: p4 size 32768 extends beyond EOD, truncated [ 364.581696][T18330] loop4: partition table beyond EOD, truncated [ 364.588310][T18330] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 364.849581][T18348] loop3: detected capacity change from 0 to 1 [ 364.914602][T18348] loop3: p1 p2 p3 p4 [ 364.918714][T18348] loop3: partition table partially beyond EOD, truncated [ 364.926993][T18348] loop3: p1 start 1 is beyond EOD, truncated [ 364.933330][T18348] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 364.946491][T18348] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 364.956706][T18348] loop3: p4 size 32768 extends beyond EOD, truncated [ 365.099571][T18251] IPVS: ftp: loaded support on port[0] = 21 [ 365.683648][T18251] chnl_net:caif_netlink_parms(): no params data found [ 365.842130][T18251] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.850920][T18251] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.861501][T18251] device bridge_slave_0 entered promiscuous mode [ 365.878631][T18251] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.887168][T18251] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.897532][T18251] device bridge_slave_1 entered promiscuous mode [ 365.959205][T18251] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 365.981179][T18251] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 366.033700][T18251] team0: Port device team_slave_0 added [ 366.051037][T18251] team0: Port device team_slave_1 added [ 366.110010][T18251] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 366.117531][T18251] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 366.146348][T18251] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 366.187061][T18251] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 366.194795][T18251] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 366.226742][T18251] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 366.308272][T18251] device hsr_slave_0 entered promiscuous mode [ 366.318911][T18251] device hsr_slave_1 entered promiscuous mode [ 366.330378][T18251] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 366.338705][T18251] Cannot create hsr debugfs directory [ 366.744851][T18251] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 366.766675][T18251] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 366.795808][T18251] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 366.829464][T18251] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 367.054052][ T8482] Bluetooth: hci5: command 0x0409 tx timeout [ 367.208097][T18251] 8021q: adding VLAN 0 to HW filter on device bond0 [ 367.257217][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 367.268035][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 367.296364][T18251] 8021q: adding VLAN 0 to HW filter on device team0 [ 367.325043][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 367.336348][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 367.346113][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.353706][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.415775][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 367.425775][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 367.436168][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 367.446470][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.454696][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.464645][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 367.476769][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 367.518592][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 367.529962][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 367.560698][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 367.571607][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 367.583641][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 367.632852][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 367.644667][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 367.685902][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 367.697461][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 367.727297][T18251] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 367.793189][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 367.801205][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 367.846684][T18251] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 368.159006][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 368.170872][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 368.243423][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 368.256649][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 368.282243][T18251] device veth0_vlan entered promiscuous mode [ 368.292076][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 368.302009][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 368.402961][T18251] device veth1_vlan entered promiscuous mode [ 368.523572][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 368.536093][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 368.546003][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 368.556289][ T3697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 368.590008][T18251] device veth0_macvtap entered promiscuous mode [ 368.620202][T18251] device veth1_macvtap entered promiscuous mode [ 368.697024][T18251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.708940][T18251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.719210][T18251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.731711][T18251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.742289][T18251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.753206][T18251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.763329][T18251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.774142][T18251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.784507][T18251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.795206][T18251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.809828][T18251] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 368.821059][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 368.830928][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 368.842616][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 368.852987][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 368.915623][T18251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.926508][T18251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.938329][T18251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.949719][T18251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.959949][T18251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.970811][T18251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.981104][T18251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.991927][T18251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 369.002251][T18251] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 369.013042][T18251] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 369.027656][T18251] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 369.039275][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 369.049853][T11178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 369.110328][T18251] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 369.119414][T18251] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 369.128607][T18251] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 369.132963][T18566] Bluetooth: hci5: command 0x041b tx timeout [ 369.137774][T18251] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 369.564886][ T575] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 369.573062][ T575] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 369.581518][ T8482] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 369.684204][ T575] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 369.692258][ T575] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 369.707324][ T1976] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 369.940017][T18614] loop5: detected capacity change from 0 to 1 [ 369.998678][T18614] Dev loop5: unable to read RDB block 1 [ 370.004771][T18614] loop5: unable to read partition table [ 370.020702][T18614] loop5: partition table beyond EOD, truncated [ 370.027354][T18614] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 06:15:48 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x1c0}]) 06:15:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, 0x0, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:48 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) 06:15:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{0x0}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:48 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030", 0x30, 0x1c0}]) 06:15:48 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 370.451653][T18629] loop4: detected capacity change from 0 to 1 [ 370.458741][T18625] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 370.509626][T18626] loop2: detected capacity change from 0 to 1 [ 370.517970][T18628] loop3: detected capacity change from 0 to 1 [ 370.595278][T18629] Dev loop4: unable to read RDB block 1 [ 370.601567][T18629] loop4: unable to read partition table [ 370.615934][T18626] loop2: p1 p2 p3 p4 [ 370.619997][T18626] loop2: partition table partially beyond EOD, truncated [ 370.628633][T18626] loop2: p1 start 1 is beyond EOD, truncated [ 370.634925][T18626] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 370.649712][T18628] loop3: p1 p2 p3 p4 [ 370.654809][T18628] loop3: partition table partially beyond EOD, truncated [ 370.662721][T18628] loop3: p1 start 1 is beyond EOD, truncated [ 370.668955][T18628] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 370.739201][T18625] 8021q: adding VLAN 0 to HW filter on device bond88 [ 370.769646][T18627] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 370.868346][T18627] 8021q: adding VLAN 0 to HW filter on device bond99 [ 370.915334][T18629] loop4: partition table beyond EOD, truncated [ 370.922207][T18629] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 371.033702][T18628] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 371.057798][T18628] loop3: p4 size 32768 extends beyond EOD, truncated [ 371.092784][T18626] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 371.109240][T18626] loop2: p4 size 32768 extends beyond EOD, truncated [ 371.213204][ T1976] Bluetooth: hci5: command 0x040f tx timeout 06:15:50 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030", 0x30, 0x1c0}]) [ 371.316326][ T4685] loop3: p1 p2 p3 p4 [ 371.320770][ T4685] loop3: partition table partially beyond EOD, truncated [ 371.329196][ T4685] loop3: p1 start 1 is beyond EOD, truncated [ 371.337814][ T4685] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 371.357165][T18722] loop5: detected capacity change from 0 to 1 06:15:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 371.501946][T18722] Dev loop5: unable to read RDB block 1 [ 371.509295][T18722] loop5: unable to read partition table [ 371.523457][T18722] loop5: partition table beyond EOD, truncated [ 371.530124][T18722] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 06:15:50 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:50 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) [ 371.569498][ T4685] loop3: p3 size 1912633224 extends beyond EOD, truncated 06:15:50 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 371.668097][ T4685] loop3: p4 size 32768 extends beyond EOD, truncated 06:15:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8971, &(0x7f0000000000)={'gretap0\x00', 0x0}) [ 371.932258][T18741] loop4: detected capacity change from 0 to 1 [ 372.055861][T18741] Dev loop4: unable to read RDB block 1 [ 372.061679][T18741] loop4: unable to read partition table [ 372.063621][T18746] loop3: detected capacity change from 0 to 1 [ 372.119573][T18749] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 372.139395][T18746] loop3: p1 p2 p3 p4 [ 372.144825][T18746] loop3: partition table partially beyond EOD, truncated [ 372.152660][T18746] loop3: p1 start 1 is beyond EOD, truncated [ 372.159281][T18746] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 372.200544][T18749] 8021q: adding VLAN 0 to HW filter on device bond100 [ 372.206235][T18741] loop4: partition table beyond EOD, truncated [ 372.216278][T18741] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 372.229045][T18752] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 372.375220][T18746] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 372.504957][T18746] loop3: p4 size 32768 extends beyond EOD, truncated [ 372.539682][T18752] 8021q: adding VLAN 0 to HW filter on device bond89 06:15:51 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030", 0x30, 0x1c0}]) 06:15:51 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) 06:15:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x5460, 0x0) 06:15:51 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 373.208080][T18839] loop4: detected capacity change from 0 to 1 [ 373.293478][T18566] Bluetooth: hci5: command 0x0419 tx timeout [ 373.340746][T18844] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 373.375873][T18839] Dev loop4: unable to read RDB block 1 [ 373.381576][T18839] loop4: unable to read partition table [ 373.521468][T18839] loop4: partition table beyond EOD, truncated [ 373.529498][T18839] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 373.558225][T18844] 8021q: adding VLAN 0 to HW filter on device bond101 06:15:52 executing program 5: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x4}) [ 373.633005][T18885] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 373.776065][T18885] 8021q: adding VLAN 0 to HW filter on device bond90 06:15:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:52 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) [ 374.042902][T18924] loop3: detected capacity change from 0 to 1 06:15:52 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 374.084835][T18924] loop3: p1 p2 p3 p4 [ 374.090285][T18924] loop3: partition table partially beyond EOD, truncated [ 374.098437][T18924] loop3: p1 start 1 is beyond EOD, truncated [ 374.104841][T18924] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 374.115483][T18924] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 374.126399][T18924] loop3: p4 size 32768 extends beyond EOD, truncated 06:15:53 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:53 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:53 executing program 5: clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000200), 0x0, &(0x7f0000000280)={0x3ff}, &(0x7f00000002c0)={0x0, r0+10000000}, &(0x7f0000000340)={&(0x7f0000000300)={[0x4]}, 0x8}) [ 374.651947][T18942] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 374.738674][T18946] loop4: detected capacity change from 0 to 1 [ 374.791613][T18942] 8021q: adding VLAN 0 to HW filter on device bond102 [ 374.998912][T18946] Dev loop4: unable to read RDB block 1 [ 375.005019][T18946] loop4: unable to read partition table [ 375.022792][T18946] loop4: partition table beyond EOD, truncated [ 375.029193][T18946] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 06:15:53 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) [ 375.141558][T18987] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 375.266994][T18987] 8021q: adding VLAN 0 to HW filter on device bond91 06:15:54 executing program 5: clock_gettime(0x0, &(0x7f0000000140)={0x0}) select(0x40, &(0x7f0000000080), &(0x7f00000000c0), 0x0, &(0x7f0000000180)={r0}) 06:15:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 375.437023][T19016] loop3: detected capacity change from 0 to 1 06:15:54 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 375.554453][T19016] loop3: p1 p2 p3 p4 [ 375.558604][T19016] loop3: partition table partially beyond EOD, truncated [ 375.566537][T19016] loop3: p1 start 1718379891 is beyond EOD, truncated [ 375.574460][T19016] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 375.597416][T19016] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 375.612796][T19016] loop3: p4 size 32768 extends beyond EOD, truncated 06:15:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:54 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x10, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 376.111565][T19044] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 376.178607][T19047] loop4: detected capacity change from 0 to 1 [ 376.222816][T19044] 8021q: adding VLAN 0 to HW filter on device bond103 06:15:55 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000300), &(0x7f0000000480)=0x4) [ 376.346087][T19047] Dev loop4: unable to read RDB block 1 [ 376.352113][T19047] loop4: unable to read partition table [ 376.376302][T19047] loop4: partition table beyond EOD, truncated [ 376.383161][T19047] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 06:15:55 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 376.585314][T19086] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 376.658010][T19086] 8021q: adding VLAN 0 to HW filter on device bond92 [ 376.724539][T19123] loop3: detected capacity change from 0 to 1 06:15:55 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000", 0x38, 0x1c0}]) [ 376.788220][T19123] loop3: p1 p2 p3 p4 [ 376.793412][T19123] loop3: partition table partially beyond EOD, truncated [ 376.801468][T19123] loop3: p1 start 1 is beyond EOD, truncated [ 376.807948][T19123] loop3: p2 size 1073741824 extends beyond EOD, truncated 06:15:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 376.971315][T19123] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 376.996780][T19123] loop3: p4 size 32768 extends beyond EOD, truncated [ 377.010069][T19131] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 377.121062][T19131] 8021q: adding VLAN 0 to HW filter on device bond104 06:15:56 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 377.379502][T19175] loop2: detected capacity change from 0 to 1 06:15:56 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 377.511948][T19175] loop2: p1 p2 p3 p4 [ 377.516585][T19175] loop2: partition table partially beyond EOD, truncated [ 377.525250][T19175] loop2: p1 start 1 is beyond EOD, truncated [ 377.531404][T19175] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 377.630768][T19183] loop4: detected capacity change from 0 to 1 06:15:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x3, 0x0, &(0x7f0000000140)) [ 377.674175][T19175] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 377.707919][T19175] loop2: p4 size 32768 extends beyond EOD, truncated [ 377.725868][T19183] Dev loop4: unable to read RDB block 1 [ 377.731957][T19183] loop4: unable to read partition table 06:15:56 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 377.806007][T19183] loop4: partition table beyond EOD, truncated [ 377.812781][T19183] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 378.092536][T19195] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:15:56 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:57 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 378.293953][T19195] 8021q: adding VLAN 0 to HW filter on device bond93 [ 378.313904][T19198] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 378.430929][T19198] 8021q: adding VLAN 0 to HW filter on device bond105 06:15:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f0000001540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x62) [ 378.621498][T19272] loop3: detected capacity change from 0 to 1 [ 378.685160][T19272] loop3: p1 p2 p3 p4 [ 378.689305][T19272] loop3: partition table partially beyond EOD, truncated [ 378.700740][T19272] loop3: p1 start 1 is beyond EOD, truncated [ 378.707755][T19272] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 378.720907][T19272] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 378.731398][T19272] loop3: p4 size 32768 extends beyond EOD, truncated 06:15:57 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:57 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 378.998792][T19286] loop2: detected capacity change from 0 to 1 [ 379.128451][T19292] loop4: detected capacity change from 0 to 1 [ 379.248709][T19286] loop2: p1 p2 p3 p4 [ 379.254073][T19286] loop2: partition table partially beyond EOD, truncated [ 379.262145][T19286] loop2: p1 start 1 is beyond EOD, truncated [ 379.268670][T19286] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 379.324754][T19292] Dev loop4: unable to read RDB block 1 [ 379.330622][T19292] loop4: unable to read partition table [ 379.359732][T19299] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:15:58 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 379.402091][T19292] loop4: partition table beyond EOD, truncated [ 379.408821][T19292] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 379.463295][T19299] 8021q: adding VLAN 0 to HW filter on device bond106 [ 379.617381][T19286] loop2: p3 size 1912633224 extends beyond EOD, truncated 06:15:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8995, &(0x7f0000000000)={'gretap0\x00', 0x0}) [ 379.680875][T19286] loop2: p4 size 32768 extends beyond EOD, truncated [ 379.730917][T19339] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 379.845452][T19339] 8021q: adding VLAN 0 to HW filter on device bond94 06:15:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:58 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 379.996724][T19346] loop3: detected capacity change from 0 to 1 [ 380.065499][T19346] loop3: p1 p2 p3 p4 [ 380.069876][T19346] loop3: partition table partially beyond EOD, truncated [ 380.078160][T19346] loop3: p1 start 1 is beyond EOD, truncated [ 380.084810][T19346] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 380.159499][T19384] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 380.171950][T19346] loop3: p3 size 1912633224 extends beyond EOD, truncated 06:15:59 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 380.251501][T19384] 8021q: adding VLAN 0 to HW filter on device bond107 [ 380.274947][T19346] loop3: p4 size 32768 extends beyond EOD, truncated 06:15:59 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:59 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, 0x0, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:15:59 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:15:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x40049409, &(0x7f0000000000)={'gretap0\x00', 0x0}) [ 380.905438][T19437] loop4: detected capacity change from 0 to 1 [ 381.014713][T19437] Dev loop4: unable to read RDB block 1 [ 381.023244][T19437] loop4: unable to read partition table [ 381.036418][T19437] loop4: partition table beyond EOD, truncated [ 381.043098][T19437] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 381.102799][T19442] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 381.188070][T19442] 8021q: adding VLAN 0 to HW filter on device bond108 [ 381.217187][T19444] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 381.320074][T19444] 8021q: adding VLAN 0 to HW filter on device bond95 06:16:00 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080", 0x3c, 0x1c0}]) [ 381.723637][T19519] loop3: detected capacity change from 0 to 1 [ 381.844835][T19519] loop3: p1 p2 p3 p4 [ 381.848979][T19519] loop3: partition table partially beyond EOD, truncated [ 381.860660][T19519] loop3: p1 start 1 is beyond EOD, truncated [ 381.867220][T19519] loop3: p2 size 1073741824 extends beyond EOD, truncated 06:16:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, 0x0, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4429900}, 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[], 0x33fe0}}, 0x0) [ 381.983910][T19519] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 382.005606][T19519] loop3: p4 size 32768 extends beyond EOD, truncated 06:16:00 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 382.336051][T19536] loop4: detected capacity change from 0 to 1 06:16:01 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) [ 382.447565][T19536] Dev loop4: unable to read RDB block 1 [ 382.456129][T19536] loop4: unable to read partition table [ 382.464688][T19536] loop4: partition table beyond EOD, truncated [ 382.471077][T19536] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 382.482534][T19539] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:16:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x6, &(0x7f0000000040)=@framed={{}, [@alu, @map_val]}, &(0x7f0000000080)='GPL\x00', 0x0, 0xcb, &(0x7f00000000c0)=""/203, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 382.731056][T19539] 8021q: adding VLAN 0 to HW filter on device bond96 [ 382.748496][T19570] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 382.819677][T19570] 8021q: adding VLAN 0 to HW filter on device bond109 06:16:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0xa, &(0x7f0000001540)=[{&(0x7f00000000c0)="15b0dea9a71c20bfb084852cdae2170225d24530079149bc6369456efd31628504f3b2fbb2d46838b93340fbae8452cad84b24a058385219fe2805adc606bd81524775bbd84e2f01da9371892dd2d3247267833016d2bdbbe451f4c119da34e7a6ddc2cb65c7ffb308409c76ed9007d9716fc309bcd1bbb43337e9b06808e3c74f6ca0a35acea8eca1ca6d3a3fbcc3793751b3c58cedf8d857ae66dde7794c2bc54c8b396b8efb2d235f3ca2c9f8b2760a7e4ca526d11797322c78334670e719b55f4d38458cea25cb9c61259d1a91ee", 0xd0, 0x905}, {&(0x7f00000001c0)="c32e9e90bbb1625fd217c1f9518bc32e5e1b6d162fbdd987a4d4e67a39856ec7e3e6535fb60e612a1c5e53b6d47699d6cb91f226877150da8de3de4a0b6bbde7f8596435d00b194cfe76cb0cfec164840079147a2492614ec8c0d7eca375b97625ce05ad273a", 0x66, 0x7}, {&(0x7f0000000240)="1844fefd3a850f3121afe3b74caffebe7c7e82cb36e6ec98ff071331d30e6be7", 0x20, 0x101}, {&(0x7f0000000280)="3185352f934ef9bc1089864bd514f852016dafb79543b7da0724791c5c38808b686a0894f01c86757ecd67fbaec6830c05ac0e089256d8ecb33f2f001ca8ca0f4e213e144b4920d0d7fca1b213ccd9ed625233a52a2c69ded9b233e0b94562b23e5f007de92817733931d888eba268515d3097ab7a87a79b5aba15bb6d4e112b21efb0c3ee60cd0e9407c23849a55fd674aa0108bfc231e6a437c5dcbf61cdbd2d97127d4ed349742379a8d04aa8ba834bd657c2bdd5997859efdc31cbfc7b8ec982ca7a603beff837978df630d7b4b4e0ba7026d58a104eb68580454e8f9530d7b4d8e2c283043c4b8e4501936ddf46d18e8c5f69cfbe6f0103afa519feefbdd14d44386458274a7568bf997c8418a9bfe480e803fb86b3f0518535d028dfd19d260d08efe75db6020dd13f231ab9d3d3dd25e0e3201d6008f05694ce81eaf67488dd25db4f12bd3ea80048db509071ed11eda4db4afd291074728e421aa64a5d265bef76e5e09c15c2639be89c0db11fde025a4b9115b93da76b1745ae1ba0a211f524987260fe4ac197fd34ba7ad778ad291c51ea8df16ed0aa8c31fc1c6954c04f28d9d75a64121d6a0c4ca77a821c7bd0580939f91410849f46eadb97dbbc65576e0374a9e1df1c1e7bc286aeddee9b9a8b73b2c6b22795b3fa0c60948d3b848e57a10f107e16996bd3a4049ef75af4132c9896fa9d13172038271ade30215f716ba9743b7b56fa5d13dae90a080ad0c30f44621a8ccf76e1d414a0177af888a458d5a7713f29151f8be3f862931013fa942e1000a2b40048574f543b69b78b2ad5dfa19d9ce3d3263d806681f209a55bec91c25a350edaf322db801cc2f6234080f2d5070eb297bf48a33a6da8b80ddef1322ebfe8c08fdfbfd46928751c2773f376d2079486a4a21adec8bb204db119887b715e133d79c1b3a6ffc9c9f9b7c1746672ba64ed1082bd580be97ebb8765795443b5331745fd2352ae59b8e21df9ba8021ac3345e80c8ae8532cf40b5411d1f5aa10049bf5d88bc9d4b2d0cd9f5e89eb41c15bb9e9cdfda06c3609373d8c4d19d3f5b4b5db762b3472c1cc8e6d7161ffe10a1d17bbe76ae1e19e290678212f4043ed946b322c280f5578d38ad44a244a335b51245c6c12abc855f73469af7ae2e5f527c4a95a6e1a78283a47e8f5bc18324d4c31fa01dbc42f9b0df744ea93a59d109ea092793f3b6f24523f4ddec045b80dd09dce746fa7f42adca6770c447b7889f75f37cd9070820c0bcec615cdd990e4c2f592cf02da8d3dfb534108571394320f84dd38709cc8be30a92ad6f4d78d2e9dbb3ec29d043670b7dae65b9dbf639bcbd8609ec5d8ff5646a51776dc5e35dfcbf67ae1e6c05f607997e577454b96dae9dab100523904f3cf060179a94455a95ac633f20d4544ab2a7df6bbb0747932302b6375fef9bcd58bca87656625733808d120e8c2d2aff5de475fc57b9af8f61ba1b602d24579bd5a8f5ee625a3ea24cdb189adeeaebe33676e2560bed610e682e7d75779724055917cc3c05089f2640bc12f7dff72b86f822f5a148d5312d06063513328f6a25fbc6c69af9408e0186798fda5542945782f23025d23236045dc467ea38810be6e22644acfe1ecedb8b20c7ec2b088d3161c1ec85b43ded93298c23eea1e5716f7f4867d17e7f9b13015e3ab1bb9d71dbbc8d6041767b732c33d77ae619e1d20f866db1b674e73c6714d6298a8420045a70e538309a90a1e1ea05bd53ab54fe8d47da00bd8ee17522a618e7cccde1af42440802089f41ba369e7d488e7990c0f0da5e13f6b21222edd2040ae21ce0ae23b91133000baa9daa7504ecf433a712b67d7fb4019469d472c3c04ae41eb25726dc8aea030dcd0b4efc0c28a1477c2618e0006ccaf4c00986ba06bb4d5f7e5a9498dce0910da247fa71ae7375ab1713484feefa0bc146f5e30e81c4abb150a94cc66348e98f0d7f575839ac426b5aaa21903046e27a7567eb26939b2914f5066b6a38c14c4b1c6e1147c5c67eddd28b00e5d05138573752b256493c41aae4df223ef397010bc840a4fd1a85cea5729fc70fa16b4c55d20c402600ceb1e089248fc9fdde75fe3c7fcbed1852f2918c40c5176d56851e23aefe114332ad815438ce327bfa962ec824962ae3ec6ed68a7d924ce6b57146082494024259725ebcf7cc7e88c3ddd2a85bdfab680de73f9ce6029e1a9890c5ff089a69dca2fb50499d2a5ffbd738665dc773106ee05017aef184174c9284a7432790fb5f3b5975abc6d8b0bf7c27d23c532c89704e1b3ceb4bb3413153470354e5c88793acffa2c606713cc5eb41c570d6579d19e1e1c018ec7ef5bc41bb33cdbfcc3260c48b2d573de098728642dfeb83d009941902b038fa6f733664d644ea42bedd6acd9665f9598333db81aa1d886468c88b6c6ec1050adae9058e904189c9d71e8ce4db1149ca12c93fd73d7e8bd65a048dfaf732fc7016b61e9adc84bd07fafca5048e0b1ebdb286f3f30ac30bb6c88a4521d492f2b3b816aa5d6905c9db35f45595980c58563a2fad383bfcc924586b7d38636430cc8e3a203f38c51f1f70b5c4e2920743f766f7d65b233177e0e29017205e505ed6e4f450a96619db807d8bf83bae41b6f1459c294531c65179b61e33dda4ea36aca126d4b62e39f52a353084625b0bdb1ef4c474315ef1910f5acd6487e096b58c83f0f0d78fbb99e39a27e80e00a4173fc8f9efbf4f884f0cabc85b121c0743601df0f54d7b02d9624dd6c4d168711acd934c53c772789ce4c45d40d078bd8941a9722dd752e1037b62ea8d372dbf6a51d13e31ff1d9dc0e12210badf4035bb6b6a43002241a2e666fcfdafa70ffc3957da5f775ae5f8f2de5fc0c313d250862f9392d83c4a3225ce1d11b686ccb97214f2abadbb5921566ed8407a244b0a9c2f65eb8af98e0e09095a593a3f28fc98b0868c18963d6544dafc8918c7742e58090ec44e6b6946d075f235d2c4a1a2892d1960eee6d82e4e71ab6178671238cf594e2c419a9b49fae57c0877b63c61e2031b29eab298d695d4c59d4e7ba1e7e1edbd1f6d15074dfa3b7927706fe83a33efdc7fc8293ddd830d0409183815af95ab47059c645692afdff80b03a487c7ce2c20dd6d2d1fb765f5ebbe14d01e53ccce1ec49faacad76e556c580a30834ec3fa7e6f6d7facc3b76b088cdc7f0736abd9578d8ffd32eb5d8d1392e5360c97639c03dcd942f23d36b6608106a26738e6a8cb10b44dafd03ba1abba8e6989dbba19637f148249d2a68e86987e2547d1c45d0df83a3e0ce2fb2d7d6535553594d4aee8a5b2b86809d4631dd8442162156caf66a516e51afa6d3fd7a18d96c292ec0a9002b7592e650da8f03757b767a4563133b3be57fc92097476010710636a8ef978fb547d97547e4350f930db1a6d2e704d4b692387a7e6068a9a7fd082e5ef48d5836a80568f3eecdb9057deb0370128e43d292e33095df098fc34c679dc90db37704ade3aa80c55fe3be8b89ebe746f5305839b6714d19b3670207fdbf972c1928305eeac6be6c922c0efead748cb47eb6f46ed2b36a75192e08add132e7664d3374cdf7571e7f9457ea4f13d5007718d092a4455cb9f749d25626f23720679e52ed826c63cb4fffefc9b0717031d639b915667634d4e096903df9be4b233959b4fe757dbcdd41d3e3834758af1003ef1e8c8046b5e70d150bd8f541dab7d46feee000cee0dc8bd00aac55ff758c28f9d783f019b44331abab6ce2470e9c948ece16f177942f0e1c4e025522aff89f4d4f3e4e28b906dc8ac8b2869d7a31db4fc55d19688cc82e29fa361f3feeaeeee1d13eed3c726f52112ae65098149541a89d323f15c718b0962115356ff3925df07890ad618259d885e65e2151a70c18f994db82c61fce9a72874ebc267cdd72fd0ffa81d3ca6975fe0a320c8151b28a7c7b39874baae43bb5aab28a08ca8c9bd6a7f9b93622541e00449232cc90b7c285efa263a0bbbc18b32b20580c2e030154e74d9a30e34921157f93d1e45db0d9bd2f900f33b2ab856863572d6c2808b8b231b4d1a33294af7a0236e311cee8d041bcb2bba31a204d162575fe68d04544857b32bbfdd19bf74779f044f2bb17225feb1fa88e431c2b9b328dc06063536d741271f7c0a64707e46fa456ae70fae729a87bc5cec60037b90f0bc9a8f3452846a134afc80e5fc6a841d3a3496dae57ee0d47d1d48d4dfe5687a55ccadd78a97de482b209365f5f10a6921b6c18e22aeca6bf6a23a8678ee819f410c8248e10ecaf2613fc448037431a8457eb84706acb33b7ffe9c6b8362e04871d0ff26440ce4f0e1cb8e18aeeca79f61928d1d84012db54dc64b7e7b402bed01b1eb3d7adf2de2858d5edd56f7fb5321e17a35a1c2a85463761ee4fdc4d237e414571122e90b19e63c29e27c4b47111295f538f56ec26ffac28c1b2290764514ab9114601a0d361f8175d116a206d4c68368938e39773fe9f1fc9219ae6112961b4249151db745295dd6323b3bbd82c4c0c839dac217387efb39de81beb68b7fd05be73e905b529c27ab5d3154392044da45fc8b41626a20290a49a30d05497d318d695a82f72fd608517bef8a9c269ed6a6672067794d6f94639457bae13fbb4cb65b730792bf4e8242984f1579aa0918bfaffddd54ac88e9fc473a931793ac4459a72513c0a20f4725819ca6114541f32a4330cdd008f23e4d091200fe0ae660cbb2fc9b8a389b55fbd906d9a61e021c22accd042ce60ee77a38748f6ce72599af516572c24061a01ca644ee6802f0092f8fc8faac938e90da7d9dd6e66fb19f3ecef65fee6e035ce7de0b26e99961eda71d4ccf0423701b3d475c49541c559963a8a8dcbe40e2e8368ea371a79e30ebf65fd4e816c83854788e98b1613069974143c50ded6452a21484d621d214cc9ccee8fb5a6b870cddc9b03ea3bb9906d1ee9a34d2f49e29fd42b9be2a9c0998a8e30f8f5944e1b8ca3a242592b3783c951bed3e718e98b96a08e4129eb5269aa24c54ce0d9f5f0c2ae24613e0162644885d022457f0af9919dff8a1beb051c8332f3f2615e83dbf481bf57705107711efdaa4eb0f15fb2985a432fa2c7a1fb1b7eefe51c6f780dac5dc64c78878e71a945513ab98068e25c33f7dbcb637a255edd0a60e18be324efe1ba0192526d9e3ff3f638cadeb8e6f0cb9795a357658023ebcc2c024152c345edb531e2713eb4b4d2b11ec6aa199a0cee8943f57ac85fdcfcf057b412111c6f1dd245385a99ba287fd1938e001fcf46236f4c9efc283c65ec036b2877dd826debd37254c76f6c05db12f02f8907b0882aee0524578821c7f656cc3ac12de90169f6c582f3d3224eae1f81d469e6e3f8f0c655fe3258838f4dee6bf55a9fd83f3488aa2c92a24f6f6998af519502b86a788239a5d005b008a74d84396c210d893538305a7082d83559c89c21d45ce4600c40b80133bbf4dc8570b0c544c859f9d19fbfddb5c355c680361f5f48646032d6e2b8a413271ffca3452f0f0348f78221a6a10c449d3f6af8505c9debacd89648fa8462a7a78dd0e4260316cb6ddccac15db8a48305cc8dde1b96e5a6ca0822037e23cc43526077de9e8260950a0712b076d139c4ed21f9d1134883d9192c1d3a81212bb88a9a4d217b603e573809ddedfc4cbb04f8413052dc69690e571350ebcc86e0ed5e8e4776afdfe171c008635ca0b39b651ce1b80180e4981fcf5c6c6a532de0fbd6e1e1b3ac6e0341ec6c2b81d9526c1138f1f7a48a3f49cb9fca", 0x1000, 0x68}, {&(0x7f0000001280)="5df84d550906cf94067b6c755e6173cef24b9bb4824ec1e1b4d11b", 0x1b, 0x2}, {&(0x7f00000012c0)="bd306fefe987034e99e438b685459a5957c9afd05ef98813c9aa2f1f6d7a8ccc16f85438270e563720", 0x29, 0x9}, {&(0x7f0000001340), 0x0, 0x4d9}, {&(0x7f0000001380)="b47766e84ff6ab5ab4fba6c9185702c977673a0a8b4134b4ea4bfe0431f4d367fd080dd83b13739957c98d445a453ff63e29d47582a0a321851c2cfd7fdfaabcd19c01061daef71fa21360f8947689fa0ccdf7eca0962d63c4f9dea858", 0x5d, 0x1000}, {&(0x7f0000001400)="877ab6ff60b3473a6e2210328f9acd784e944e9edefb10b2b6274d0db5cef9d6b237bae3462e4d27d75cb98ffa830ba0c3fd80286924bf865ce26b502ad77a530eac3d58bb86e727261752e7d94d584ccc3cbb46d334054eb269880f9382323f5c4d7f8ed7123b1dacfb0da39f908fdcf1bfb78017f251fff7cf27870fceb206330fea977b39fb0c86170528", 0x8c, 0x4}, {&(0x7f00000014c0)="f54bfb2bf81cbdcf78d7d6cdcdb6429b46a1819c23806abee64e48a1f40ad27ab19febf8285b4bc1f988e1ab9886d2f454434f60cfe080409351085d9ebb1a2627adb4477011acd308ea322d2624a9ed12fa4793648575c5f49f7f29e9f2", 0x5e, 0x1714}], 0x0, &(0x7f0000001640)={[{@bsdgroups}, {@debug_want_extra_isize}]}) 06:16:01 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 06:16:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, 0x0, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 383.265728][T19618] loop2: detected capacity change from 0 to 23 06:16:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003080)={0x0, 0x1, &(0x7f0000002f40)=@raw=[@call], &(0x7f0000002f80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 383.359438][T19618] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 383.455354][T19618] loop2: detected capacity change from 0 to 23 [ 383.494568][T19618] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 383.585791][T19629] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 383.628642][T19629] 8021q: adding VLAN 0 to HW filter on device bond110 06:16:02 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:16:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 383.933590][ T7] Bluetooth: hci2: command 0x0406 tx timeout [ 383.985126][T19669] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:16:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8970, &(0x7f0000000000)={'gretap0\x00', 0x0}) 06:16:02 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) accept4$nfc_llcp(r0, 0x0, 0x0, 0x0) [ 384.169996][T19669] 8021q: adding VLAN 0 to HW filter on device bond97 [ 384.226359][T19672] loop4: detected capacity change from 0 to 1 06:16:03 executing program 5: timer_create(0x2, 0x0, &(0x7f00000005c0)) [ 384.331081][T19672] Dev loop4: unable to read RDB block 1 [ 384.337313][T19672] loop4: unable to read partition table [ 384.457667][T19672] loop4: partition table beyond EOD, truncated [ 384.464420][T19672] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 384.485777][T19712] loop3: detected capacity change from 0 to 1 [ 384.621848][ T4685] Dev loop4: unable to read RDB block 1 [ 384.628059][ T4685] loop4: unable to read partition table [ 384.636752][T19712] loop3: p1 p2 p3 p4 [ 384.641093][T19712] loop3: partition table partially beyond EOD, truncated [ 384.649026][T19712] loop3: p1 start 1 is beyond EOD, truncated [ 384.655495][T19712] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 384.666914][ T4685] loop4: partition table beyond EOD, truncated 06:16:03 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 384.699645][T19712] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 384.732290][T19719] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 384.770737][T19712] loop3: p4 size 32768 extends beyond EOD, truncated [ 384.968843][T19719] 8021q: adding VLAN 0 to HW filter on device bond111 06:16:03 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) 06:16:03 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x147ec1, 0x0) 06:16:04 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 06:16:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000500)='ext2\x00', &(0x7f0000000540)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x1000, &(0x7f0000000640)) [ 385.333545][T19767] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 385.413398][T19767] 8021q: adding VLAN 0 to HW filter on device bond98 06:16:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 385.715347][T19806] loop4: detected capacity change from 0 to 1 06:16:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 385.866366][T19806] Dev loop4: unable to read RDB block 1 [ 385.873326][T19806] loop4: unable to read partition table [ 385.947191][T19806] loop4: partition table beyond EOD, truncated [ 385.953933][T19806] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 385.966555][ T4685] Dev loop4: unable to read RDB block 1 [ 385.973239][ T4685] loop4: unable to read partition table [ 386.005682][ T4685] loop4: partition table beyond EOD, truncated [ 386.049165][T19812] loop3: detected capacity change from 0 to 1 [ 386.117409][T19812] loop3: p1 p2 p3 p4 [ 386.121749][T19812] loop3: partition table partially beyond EOD, truncated [ 386.134978][T19812] loop3: p1 start 1 is beyond EOD, truncated [ 386.143950][T19812] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 386.272133][T19823] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:05 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c3000000000000800000", 0x3e, 0x1c0}]) [ 386.383856][T19812] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 386.460346][T19812] loop3: p4 size 32768 extends beyond EOD, truncated [ 386.462840][T19823] 8021q: adding VLAN 0 to HW filter on device bond112 [ 386.485158][T19830] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:16:05 executing program 2: timer_create(0x3, &(0x7f0000000180)={0x0, 0x1b, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) [ 386.587031][T19830] 8021q: adding VLAN 0 to HW filter on device bond99 [ 386.786116][ T4685] loop3: p1 p2 p3 p4 [ 386.790230][ T4685] loop3: partition table partially beyond EOD, truncated [ 386.798071][ T4685] loop3: p1 start 1 is beyond EOD, truncated [ 386.804421][ T4685] loop3: p2 size 1073741824 extends beyond EOD, truncated 06:16:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000001540)=[{0x0}], 0x0, &(0x7f0000001640)) open$dir(&(0x7f0000003900)='./file0\x00', 0x0, 0x0) [ 386.936176][ T4685] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 386.978248][ T3122] ieee802154 phy0 wpan0: encryption failed: -22 [ 386.984987][ T3122] ieee802154 phy1 wpan1: encryption failed: -22 06:16:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 387.100333][ T4685] loop3: p4 size 32768 extends beyond EOD, truncated [ 387.229926][T19914] loop4: detected capacity change from 0 to 1 06:16:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000007380)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)='.', 0x1}, {0x0}], 0x2}], 0x1, 0x0) [ 387.341053][T19914] Dev loop4: unable to read RDB block 1 [ 387.347072][T19914] loop4: unable to read partition table 06:16:06 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 387.446926][T19914] loop4: partition table beyond EOD, truncated [ 387.454695][T19914] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 06:16:06 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) [ 387.682816][T19925] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:16:06 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 387.757667][T19926] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 387.835126][T19925] 8021q: adding VLAN 0 to HW filter on device bond100 [ 387.979735][T19926] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 388.045684][T19972] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 388.152928][T19972] 8021q: adding VLAN 0 to HW filter on device bond113 [ 388.314751][T20010] loop4: detected capacity change from 0 to 1 06:16:07 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)="ea198074a49192a89411c864b06c54463e89be57d41b2a5dc0d8cc779e5581a2a0586e4759", 0x25}, 0x0) [ 388.369014][T20010] Dev loop4: unable to read RDB block 1 [ 388.375287][T20010] loop4: unable to read partition table [ 388.427891][T20010] loop4: partition table beyond EOD, truncated [ 388.434803][T20010] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 06:16:07 executing program 5: rt_sigtimedwait(&(0x7f0000000100), 0x0, &(0x7f0000000200)={0x0, 0x3938700}, 0x8) 06:16:07 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 388.629298][T20014] loop3: detected capacity change from 0 to 1 06:16:07 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) [ 388.709442][T20014] loop3: p1 p2 p3 p4 [ 388.714174][T20014] loop3: partition table partially beyond EOD, truncated [ 388.721916][T20014] loop3: p1 start 1 is beyond EOD, truncated [ 388.729537][T20014] loop3: p2 size 1073741824 extends beyond EOD, truncated 06:16:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 388.844793][T20014] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 388.913833][T20014] loop3: p4 size 32768 extends beyond EOD, truncated 06:16:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000004740)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000004640)=[@rights={{0x10}}], 0x10}], 0x1, 0x0) [ 389.278461][T20036] loop4: detected capacity change from 0 to 1 [ 389.292690][T20035] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 389.378007][T20036] Dev loop4: unable to read RDB block 1 [ 389.384395][T20036] loop4: unable to read partition table [ 389.446770][T20035] 8021q: adding VLAN 0 to HW filter on device bond101 [ 389.458678][T20038] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:08 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) [ 389.578304][T20036] loop4: partition table beyond EOD, truncated [ 389.585526][T20036] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 389.645490][T20038] 8021q: adding VLAN 0 to HW filter on device bond114 06:16:08 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000001c0)=@req3, 0x1c) 06:16:08 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:08 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055", 0x3f, 0x1c0}]) 06:16:08 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) read$rfkill(r0, 0x0, 0x0) 06:16:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:09 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0x9, 0x0) 06:16:09 executing program 5: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) select(0x40, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180)={0x0, r0/1000+60000}) [ 390.626189][T20126] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 390.682579][T20129] loop4: detected capacity change from 0 to 1 [ 390.737688][T20126] 8021q: adding VLAN 0 to HW filter on device bond102 [ 390.751982][T20127] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 390.777767][T20129] Dev loop4: unable to read RDB block 1 [ 390.783785][T20129] loop4: unable to read partition table [ 390.797706][T20129] loop4: partition table beyond EOD, truncated [ 390.804559][T20129] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) [ 390.854675][ T4685] Dev loop4: unable to read RDB block 1 [ 390.860633][ T4685] loop4: unable to read partition table [ 390.907355][T20127] 8021q: adding VLAN 0 to HW filter on device bond115 [ 390.978213][ T4685] loop4: partition table beyond EOD, truncated 06:16:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) sendmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@rights={{0x14, 0x1, 0x1, [r1]}}], 0x18}, 0x0) 06:16:09 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) 06:16:09 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) 06:16:10 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:10 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8929, &(0x7f0000000000)={'gretap0\x00', 0x0}) [ 391.766936][T20214] loop3: detected capacity change from 0 to 1 [ 391.878386][T20222] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 391.925645][T20222] 8021q: adding VLAN 0 to HW filter on device bond103 06:16:10 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x19) [ 391.979446][T20214] loop3: p1 p2 p3 p4 [ 391.984045][T20214] loop3: partition table partially beyond EOD, truncated [ 391.992700][T20214] loop3: p1 start 1 is beyond EOD, truncated [ 391.999037][T20214] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 392.042645][T20260] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 392.056196][T20214] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 392.100580][T20260] 8021q: adding VLAN 0 to HW filter on device bond116 [ 392.221255][T20214] loop3: p4 size 32768 extends beyond EOD, truncated 06:16:11 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) 06:16:11 executing program 5: r0 = gettid() pipe2(&(0x7f0000000fc0)={0xffffffffffffffff}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x0, 0x0}, 0x30) 06:16:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:11 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:11 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) 06:16:11 executing program 2: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000001c40)=[{}], 0x1, 0x6, &(0x7f0000001c80)={[0xffffffffffffff7e]}, 0x8) [ 393.139927][T20316] loop3: detected capacity change from 0 to 1 [ 393.269314][T20316] loop3: p1 p2 p3 p4 [ 393.273894][T20316] loop3: partition table partially beyond EOD, truncated [ 393.281857][T20316] loop3: p1 start 1 is beyond EOD, truncated [ 393.289440][T20316] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 393.371436][T20326] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 393.468807][T20326] 8021q: adding VLAN 0 to HW filter on device bond104 [ 393.482212][T20329] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:12 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40}]) 06:16:12 executing program 5: syz_open_dev$vcsn(&(0x7f0000000d00), 0x2, 0x8e640) [ 393.600211][T20316] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 393.632849][T20329] 8021q: adding VLAN 0 to HW filter on device bond117 06:16:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003080)={0x11, 0x1, &(0x7f0000002f40)=@raw=[@exit], &(0x7f0000002f80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000003000), 0x8, 0x10, 0x0}, 0x78) [ 393.747636][T20316] loop3: p4 size 32768 extends beyond EOD, truncated 06:16:12 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:12 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:13 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$KVM_IRQFD(r0, 0x5421, 0x0) 06:16:13 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0), 0x0, 0x9, 0x0) 06:16:13 executing program 2: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) [ 394.759057][T20423] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 394.862460][T20423] 8021q: adding VLAN 0 to HW filter on device bond105 [ 394.991890][T20463] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 395.119003][T20463] 8021q: adding VLAN 0 to HW filter on device bond118 06:16:13 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:16:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8943, &(0x7f0000000000)={'gretap0\x00', 0x0}) 06:16:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000000)="fc60", 0x2, 0x0, 0x0, 0x0) 06:16:14 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:14 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:14 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8921, &(0x7f0000000000)={'gretap0\x00', 0x0}) 06:16:14 executing program 5: syz_open_dev$usbfs(&(0x7f0000000040), 0x7ff, 0x0) [ 396.224983][T20511] loop3: detected capacity change from 0 to 1 [ 396.374864][T20511] loop3: p1 p2 p3 p4 [ 396.380983][T20511] loop3: partition table partially beyond EOD, truncated [ 396.389256][T20511] loop3: p1 start 1 is beyond EOD, truncated [ 396.395608][T20511] loop3: p2 size 1073741824 extends beyond EOD, truncated 06:16:15 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) syz_open_dev$usbmon(&(0x7f00000006c0), 0x0, 0x0) [ 396.511667][T20520] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 396.611056][T20520] 8021q: adding VLAN 0 to HW filter on device bond106 [ 396.680892][T20521] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 396.736150][T20521] bond119 (uninitialized): Released all slaves [ 396.759741][T20511] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 396.829097][T20511] loop3: p4 size 32768 extends beyond EOD, truncated 06:16:15 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:15 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000100)) 06:16:16 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:16 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast1}}}}) [ 397.456202][ T4685] loop3: p1 p2 p3 p4 [ 397.460416][ T4685] loop3: partition table partially beyond EOD, truncated [ 397.468994][ T4685] loop3: p1 start 1 is beyond EOD, truncated [ 397.475784][ T4685] loop3: p2 size 1073741824 extends beyond EOD, truncated 06:16:16 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x44083, 0x0) [ 397.524806][T20572] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 397.585394][T20572] 8021q: adding VLAN 0 to HW filter on device bond119 [ 397.668233][ T4685] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 397.739123][ T4685] loop3: p4 size 32768 extends beyond EOD, truncated [ 397.753404][T20612] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 397.801600][T20612] 8021q: adding VLAN 0 to HW filter on device bond107 06:16:16 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8914, 0x0) [ 398.246778][T20658] loop3: detected capacity change from 0 to 1 06:16:17 executing program 5: syz_emit_ethernet(0x22, &(0x7f00000002c0)={@empty, @empty, @val, {@ipv4}}, 0x0) [ 398.320046][T20658] loop3: p1 p2 p3 p4 [ 398.326429][T20658] loop3: partition table partially beyond EOD, truncated [ 398.334586][T20658] loop3: p1 start 1 is beyond EOD, truncated [ 398.340745][T20658] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 398.409927][T20665] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 398.478396][T20665] 8021q: adding VLAN 0 to HW filter on device bond108 06:16:17 executing program 2: r0 = socket$inet6(0x1c, 0x5, 0x0) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) [ 398.558329][T20658] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 398.622582][T20658] loop3: p4 size 32768 extends beyond EOD, truncated [ 398.891142][T20711] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 399.000632][T20711] 8021q: adding VLAN 0 to HW filter on device bond120 06:16:17 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={0x0, 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:17 executing program 4: r0 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) sendmsg(r0, &(0x7f0000001840)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB='\f'], 0xc}, 0x0) 06:16:17 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:18 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[{0xc, 0x84, 0x7}], 0xc}, 0x0) 06:16:18 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:18 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000000c0)=@un=@file={0x10}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000100)="b8eb1ea5f46664df3eff45182536121ae30188e1a068767c805d48b3fcc7b41e56d0680e8a82aedea9ee5ad41217c7ab4e0ed148f6e251618f4674ac141b5e3ab73b361ab4fb7244efb8ac325dc8fe57ac7246e4c5ebe51d26af0951ef", 0x5d}], 0x1}, 0x0) [ 399.748696][T20760] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 399.899489][T20760] 8021q: adding VLAN 0 to HW filter on device bond109 [ 399.997315][T20764] loop3: detected capacity change from 0 to 1 [ 400.186796][T20764] loop3: p1 p2 p3 p4 [ 400.190926][T20764] loop3: partition table partially beyond EOD, truncated [ 400.198895][T20764] loop3: p1 start 1 is beyond EOD, truncated [ 400.205228][T20764] loop3: p2 size 1073741824 extends beyond EOD, truncated 06:16:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) [ 400.393233][T20811] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 400.464576][T20764] loop3: p3 size 1912633224 extends beyond EOD, truncated [ 400.556887][T20811] 8021q: adding VLAN 0 to HW filter on device bond121 [ 400.628441][T20764] loop3: p4 size 32768 extends beyond EOD, truncated 06:16:19 executing program 5: r0 = socket$inet6(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) 06:16:19 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 400.881635][T20851] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! 06:16:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:19 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x10) 06:16:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in={0xffffffffffffff24, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000000), &(0x7f0000000040)=0x8) [ 401.539076][T20864] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 401.661287][T20864] 8021q: adding VLAN 0 to HW filter on device bond110 06:16:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000000)={0x0, 0x40, 0xff, 0x253}, 0x8) [ 402.030316][T20906] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000180)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 06:16:20 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x1}, 0x1c) [ 402.351257][T20906] 8021q: adding VLAN 0 to HW filter on device bond122 06:16:21 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:21 executing program 3: r0 = socket$inet6(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 06:16:21 executing program 4: r0 = socket$inet6(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x5, 0x4) 06:16:21 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 403.045377][T20957] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 403.140411][T20957] 8021q: adding VLAN 0 to HW filter on device bond111 06:16:21 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000600)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@sndinfo={0x1c}, @sndinfo={0x1c, 0x84, 0x4, {0x0, 0x1200}}, @sndrcv={0x2c}], 0x64}, 0x0) 06:16:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180), 0x98) [ 403.442750][T21000] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 403.521199][T21000] 8021q: adding VLAN 0 to HW filter on device bond123 06:16:22 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 06:16:22 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:22 executing program 2: r0 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) 06:16:22 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = dup(r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f0000000200), &(0x7f0000000240)=0x8) 06:16:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000040)="ae6afe5cf75ae272de4a11c33a0f651cb9ec63449bad13e00c7e992fcf17129c30ca701d5e9ca306ba2f4729083c62bbc100296afd57ec12e91c5a4b587f4b0de8fd4e728b9705fdc5b228893452c7f9f33509ad7e675bab11080af956da1af7a40a030935d0e1be39e7238c148590cf49f8fc7527c45275d81594570001fc2a630b7b4a660ab6e962353383a034d0837923ae25025493717dcc539f0b7543295c4bf896300a05975510a5583d6feff64b10a1ddc1f9645045b5b093c1b6059aa1af02b82345888b07230b19b463bf60d52b0a9814356f552914e3b4", 0xdc}, {&(0x7f0000000140)="1180541bc6344011ee4a20ad4c82714e1b1dd74c72f3db9d32f9c6528f0128cd5f3b0f0d4a9ecb1324f6748975fa0a6e2348377e3c0666c8280d8b172d491b0c8f33104b39b6dc75b179e52f47d0861dae165c", 0x53}, {&(0x7f00000001c0)="e0a5e7e866dbdaa57ef4c58b82f7b732", 0x10}, {&(0x7f0000000300)="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", 0x45a}], 0x4, &(0x7f0000000240)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x3800}}, @prinfo={0x14}], 0x30}, 0x0) [ 404.439180][T21053] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:16:23 executing program 3: r0 = socket$inet6(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000000)=0x1, 0x4) [ 404.634265][T21053] 8021q: adding VLAN 0 to HW filter on device bond112 [ 404.646969][T21073] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 404.909298][T21073] 8021q: adding VLAN 0 to HW filter on device bond124 06:16:24 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), 0x8c) 06:16:24 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000200)={0x1c, 0x1c, 0x2}, 0x77) 06:16:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000040)=0x8716, 0x4) 06:16:24 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:24 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x80) [ 405.868830][T21151] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 405.971678][T21151] 8021q: adding VLAN 0 to HW filter on device bond113 [ 405.986008][T21152] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 406.139279][T21152] 8021q: adding VLAN 0 to HW filter on device bond125 06:16:25 executing program 5: fcntl$lock(0xffffffffffffffff, 0xa, 0x0) 06:16:25 executing program 2: r0 = socket$inet6(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x17) 06:16:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a0008021100000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:25 executing program 4: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) 06:16:25 executing program 3: syz_emit_ethernet(0xfbf, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd607106b50f8902000000000000000000000700000000000100000000000000000000000000000001"], 0x0) [ 407.167190][T21242] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:26 executing program 5: r0 = socket$inet6(0x1c, 0x2, 0x0) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) [ 407.377271][T21242] 8021q: adding VLAN 0 to HW filter on device bond126 [ 407.390519][T21243] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 407.627614][T21243] 8021q: adding VLAN 0 to HW filter on device bond114 06:16:26 executing program 2: r0 = socket$inet6(0x1c, 0x5, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x0) 06:16:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a0008021100000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 06:16:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind(r0, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 06:16:26 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 408.611748][T21335] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:27 executing program 5: r0 = socket$inet6(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000180)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) getsockname(r0, 0x0, &(0x7f0000000040)) 06:16:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000), 0x88) 06:16:27 executing program 3: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x7, 0x410, 0xffffffffffffffff, 0x0) [ 408.956565][T21335] 8021q: adding VLAN 0 to HW filter on device bond127 [ 408.976488][T21370] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 409.039425][T21370] 8021q: adding VLAN 0 to HW filter on device bond115 06:16:27 executing program 4: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1004, 0x3, 0x410, 0xffffffffffffffff, 0x0) 06:16:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a0008021100000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:28 executing program 2: r0 = socket$inet6(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) listen(r0, 0x0) [ 409.534139][ T56] Bluetooth: hci3: command 0x0406 tx timeout 06:16:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000000180)=@in={0x10, 0x2}, 0x10, 0x0}, 0x104) [ 409.991477][T21426] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@in={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000240)=ANY=[@ANYRES32, @ANYBLOB="fe"], 0x69) 06:16:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000300)={0x0, 0x0, 0x1, "d9"}, 0x9) [ 410.171828][T21426] 8021q: adding VLAN 0 to HW filter on device bond128 [ 410.394229][T21468] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 410.665851][T21468] 8021q: adding VLAN 0 to HW filter on device bond116 06:16:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:29 executing program 3: r0 = socket$inet6(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) 06:16:29 executing program 2: r0 = socket$inet6(0x1c, 0x3, 0x0) sendmsg(r0, &(0x7f0000001840)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x20005) 06:16:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x8}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000000), 0x8) 06:16:29 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x2018d) [ 411.189426][T21516] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 411.241788][T21516] 8021q: adding VLAN 0 to HW filter on device bond129 06:16:30 executing program 3: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendmsg(r0, &(0x7f00000008c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="cc0000008800000004000000c6752dc6300b59cf568181295891ebd81d1da599aa68393903c81abfc4bfda6863baada2cd792379677407652be1afc5981b05ccd908af0ffd19f94cee2b6a2b1d554bb187e768b27c72ad6114da8c6b7938fe7f2a03826cbdf2455b7356030e37357a565af71b7ef5ea476da54d8816852633ae7fc58659c11fa3ad42016fc9a42d3a129f8d3aadf4395ccf1f6bc3dbed65496e791e9461be272b155c4aa52b1a0df6b0de252c088f5613cfe1f817717bba08959f5648f03222e6a3dba36f42a4"], 0x170}, 0x0) 06:16:30 executing program 2: r0 = socket$inet6(0x1c, 0x3, 0x0) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/152, 0x98}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 06:16:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 411.835953][T21563] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:16:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) [ 411.974096][T21563] 8021q: adding VLAN 0 to HW filter on device bond117 06:16:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000000), 0x8) [ 412.200464][T21602] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 412.319266][T21602] 8021q: adding VLAN 0 to HW filter on device bond130 06:16:31 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000cc0)=ANY=[], 0x98) 06:16:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e01f82f"], 0xa) 06:16:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:31 executing program 4: r0 = socket$inet6(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) [ 413.124437][T21655] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 413.195467][T21655] 8021q: adding VLAN 0 to HW filter on device bond118 [ 413.370745][T21696] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000700)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@dstaddrv4={0x10, 0x84, 0x9, @broadcast}], 0x10}, 0x0) [ 413.420104][T21696] 8021q: adding VLAN 0 to HW filter on device bond131 06:16:32 executing program 3: r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0xfffffffffffffeae, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x104, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x2}, 0x1c) sendto(r0, 0x0, 0x0, 0x20080, 0x0, 0x0) 06:16:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e012e2f6c6532"], 0xa) 06:16:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:32 executing program 5: open(0x0, 0x40c44, 0x0) 06:16:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:33 executing program 4: madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x400000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 06:16:33 executing program 3: madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0x410, 0xffffffffffffffff, 0x0) [ 414.510339][T21748] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 414.595929][T21748] 8021q: adding VLAN 0 to HW filter on device bond119 06:16:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0e012e"], 0xa) [ 414.747540][T21786] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@sndinfo={0x1c, 0x84, 0x4, {0x0, 0x1200}}, @sndrcv={0x2c}], 0x48}, 0x0) [ 414.996892][T21786] 8021q: adding VLAN 0 to HW filter on device bond132 06:16:33 executing program 5: mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x1fffff, 0x1000001, 0xac031, 0xffffffffffffffff, 0x0) 06:16:33 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c0000001400010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="140020"], 0x2c}}, 0x0) 06:16:34 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000180)={0x14, 0x1, &(0x7f00000000c0)='u'}) 06:16:34 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:34 executing program 2: r0 = socket$inet6(0x1c, 0x2, 0x0) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) [ 415.760689][T21835] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 415.978147][T21835] 8021q: adding VLAN 0 to HW filter on device bond120 [ 416.069158][T21879] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 416.184764][T21879] 8021q: adding VLAN 0 to HW filter on device bond133 06:16:35 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg(r0, &(0x7f0000001b80)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) 06:16:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000140), &(0x7f0000000180)=0x4) 06:16:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffff, "be0fe969623f6376c50df6c9f4ad089f0cdd10534e0a06b1a710709d8828cfef"}) 06:16:35 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000000c0)={0x0, 0xffffffd4, &(0x7f0000000080)="345e9a6e8100ad1d"}) 06:16:36 executing program 3: setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f00000000c0)=""/93}, 0xfffffe21) [ 417.286907][T21927] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:16:36 executing program 4: mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x4060871, 0xffffffffffffffff, 0x0) [ 417.376257][T21927] 8021q: adding VLAN 0 to HW filter on device bond121 [ 417.591313][T21967] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 417.694234][T21967] 8021q: adding VLAN 0 to HW filter on device bond134 06:16:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000100)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/196, 0xc4}], 0x3}, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000cc0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={&(0x7f0000000d00)={0x14, r1, 0x1}, 0x14}}, 0x0) 06:16:37 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000080)=""/17) 06:16:37 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:37 executing program 3: socket(0x2, 0xe, 0x0) [ 418.614557][T22012] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 418.724699][T22012] 8021q: adding VLAN 0 to HW filter on device bond122 06:16:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000240)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) [ 419.153182][T22055] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 419.374854][T22055] 8021q: adding VLAN 0 to HW filter on device bond135 06:16:38 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000000c0)={0x0, 0xffffffd4, &(0x7f0000000080)="345e9a6e8100ad1d"}) 06:16:38 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x2}, 0x4) sendto$packet(r0, &(0x7f0000000080)="3678aa1fa16deca721211ac986ce", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) 06:16:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x0, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, 0x0) 06:16:38 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 420.008312][T22097] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 420.101471][T22097] 8021q: adding VLAN 0 to HW filter on device bond123 [ 420.609957][T22143] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:39 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 420.677159][T22143] 8021q: adding VLAN 0 to HW filter on device bond136 06:16:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000cc0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={&(0x7f0000000d00)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="015372000000000000000d"], 0x14}}, 0x0) 06:16:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40044590, 0x0) 06:16:39 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40044591, 0x0) [ 421.179956][T22182] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 421.422807][T22182] 8021q: adding VLAN 0 to HW filter on device bond124 [ 421.645911][T22223] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) read$FUSE(r0, 0x0, 0x0) [ 421.811583][T22223] 8021q: adding VLAN 0 to HW filter on device bond137 06:16:40 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/86, 0x102000, 0x800}, 0x1c) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000000c0)=0x802a, 0x4) 06:16:40 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000000c0)={0x0, 0xffffffd4, &(0x7f0000000080)="345e9a6e8100ad1d"}) 06:16:40 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a0008021100000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:40 executing program 2: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getpeername$packet(r1, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={@local, @ipv4={'\x00', '\xff\xff', @remote}, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @private2}, 0x1c) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x7, 0x88, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 06:16:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e15312", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x401, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 06:16:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffb2}, @btf_id, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f0000000080)='syzkaller\x00', 0x5, 0xd1, &(0x7f00000000c0)=""/209, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 422.746774][T22276] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 422.856124][T22276] 8021q: adding VLAN 0 to HW filter on device bond125 [ 423.149678][T22313] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 423.285525][T22313] 8021q: adding VLAN 0 to HW filter on device bond138 06:16:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)) ioctl$EVIOCGREP(r0, 0x40044591, 0x0) 06:16:42 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a0008021100000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) read$FUSE(r0, &(0x7f0000002cc0)={0x2020}, 0x2020) 06:16:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1b, 0x3}, 0x40) 06:16:42 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e15312", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 424.121188][T22361] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:16:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x0, 0x0) ioctl$EVIOCGBITSW(r0, 0x402c5828, &(0x7f0000000280)=""/218) [ 424.228306][T22361] 8021q: adding VLAN 0 to HW filter on device bond126 06:16:43 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000000c0)={0x0, 0xffffffd4, &(0x7f0000000080)="345e9a6e8100ad1d"}) 06:16:43 executing program 3: socket(0x2c, 0x3, 0x5) [ 424.584710][T22401] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:43 executing program 4: r0 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x343, 0x0) read$char_raw(r0, 0x0, 0x0) [ 424.657315][T22401] 8021q: adding VLAN 0 to HW filter on device bond139 06:16:43 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a0008021100000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:43 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000080)=0x10, 0x4) 06:16:44 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e15312", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000009c0)=@ipv4_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00}}, 0x1c}}, 0x0) [ 425.484461][T22448] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:16:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000002640)={&(0x7f0000004bc0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_PEERS={0x3bc, 0x8, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}, {0x8c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @loopback}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @broadcast}}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PUBLIC_KEY={0x24}]}, {0x314, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x2cc, 0x9, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2f}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x2a}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PEERS={0xac8, 0x8, 0x0, 0x1, [{0xac4, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "9a381cb0d702db040bfd5499d57e18a37aaefa04da4d5ddf85f56e6fad1af129"}, @WGPEER_A_ALLOWEDIPS={0x644, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x19}}, {0x5, 0x3, 0x2}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x33}}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x22}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @empty}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x12}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x3c8, 0x9, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x29}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}]}, {0x4}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x23}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x90, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}]}]}]}]}, 0xec4}}, 0x0) [ 425.568369][T22448] 8021q: adding VLAN 0 to HW filter on device bond127 06:16:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000080)="3678aa1fa16deca721211ac986ce", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x3, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) [ 425.998256][T22489] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 426.149018][T22489] 8021q: adding VLAN 0 to HW filter on device bond140 06:16:44 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0xffff, &(0x7f0000000100)=0x0) io_destroy(r2) io_setup(0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) pipe(0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) 06:16:45 executing program 2: sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0xb00, 0x0, 0xac031, 0xffffffffffffffff, 0x0) 06:16:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x11, 0x4, 0x0, 0x5}, 0x40) 06:16:45 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/86, 0x102000, 0x800}, 0x1c) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000000c0), 0x4) [ 426.711294][T22534] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:16:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b95", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 426.810911][T22534] 8021q: adding VLAN 0 to HW filter on device bond128 06:16:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c0000001400010000000000000000000a"], 0x2c}}, 0x0) 06:16:45 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000008c0)="f5", 0x0}, 0x1c) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x890b, &(0x7f0000000880)={'ip6_vti0\x00', 0x0}) 06:16:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={&(0x7f0000000d00)={0xf}, 0x14}}, 0x0) [ 427.420682][T22581] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:46 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffb) [ 427.531488][T22581] 8021q: adding VLAN 0 to HW filter on device bond141 06:16:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 427.639012][T22619] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 06:16:46 executing program 4: clock_gettime(0x5, &(0x7f0000000600)) 06:16:46 executing program 2: mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x1fffff, 0x0, 0xac031, 0xffffffffffffffff, 0x0) 06:16:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b95", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 428.118632][T22626] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:16:47 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x16, 0x0, 0x0, 0x7}, 0x40) [ 428.305076][T22626] 8021q: adding VLAN 0 to HW filter on device bond129 06:16:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x11, r1, 0x1, 0x0, 0x6, @remote}, 0x14) bind$packet(r0, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) 06:16:47 executing program 4: mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x1fffff, 0x1000001, 0xac032, 0xffffffffffffffff, 0x0) [ 428.706763][T22671] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:47 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000040)=""/202) [ 428.819955][T22671] 8021q: adding VLAN 0 to HW filter on device bond142 06:16:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:47 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) write$evdev(r0, 0x0, 0x0) [ 429.237841][T22714] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 429.340208][T22714] 8021q: adding VLAN 0 to HW filter on device bond130 06:16:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b95", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000080)="2678aa1fa16deca721211ac986ce", 0xe, 0x0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) 06:16:48 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89b0, &(0x7f0000000700)={'batadv_slave_1\x00'}) 06:16:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000cc0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 06:16:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:48 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f00000002c0)=0x7) [ 430.000761][T22758] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 430.122019][T22758] 8021q: adding VLAN 0 to HW filter on device bond143 06:16:49 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x40084504, 0x0) [ 430.613695][T22803] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:16:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x5}, 0x40) 06:16:49 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 430.819617][T22803] 8021q: adding VLAN 0 to HW filter on device bond131 06:16:49 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x0, 0x807}, 0x1c) 06:16:49 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x1, 0x0, &(0x7f00000000c0)) [ 431.119607][T22844] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 431.237973][T22844] 8021q: adding VLAN 0 to HW filter on device bond144 06:16:50 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:50 executing program 5: mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x1fffff, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x3, 0x81) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, 0x0, 0x0) 06:16:50 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) io_setup(0xffff, &(0x7f0000000100)=0x0) io_setup(0x8000, &(0x7f0000000000)) io_destroy(r1) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) pipe(0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)) io_submit(0x0, 0x2, &(0x7f00000013c0)=[0x0, 0x0]) 06:16:50 executing program 3: openat$kvm(0xffffff9c, &(0x7f0000000040), 0x4040, 0x0) 06:16:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c000000140001"], 0x2c}}, 0x0) 06:16:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 431.919969][T22889] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 432.046000][T22889] 8021q: adding VLAN 0 to HW filter on device bond132 06:16:51 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8923, &(0x7f0000000700)={'batadv_slave_1\x00'}) 06:16:51 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000140)={0x0, 0x6c, &(0x7f00000000c0)="c112060a47d9ba5861b468021889fac4381c8ab1b09b907fad093ee1fc7b5d1e7710cdc859a18d50715d46921473a7ebdf3246398bc2105c14bc4cba693f6ec985a241580cbff7cdab54104614748e0265a9fd64a7204c4b73be4b593bfe47de93433c2a76c390f35ec4f094"}) 06:16:51 executing program 4: r0 = openat$vcs(0xffffff9c, &(0x7f00000011c0), 0x0, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 06:16:51 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000080)=""/26) 06:16:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 432.664583][T22939] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 432.767188][T22939] 8021q: adding VLAN 0 to HW filter on device bond145 06:16:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:52 executing program 5: mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000001, 0xac031, 0xffffffffffffffff, 0x0) 06:16:52 executing program 3: openat$uinput(0xffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)) 06:16:52 executing program 2: r0 = openat$uinput(0xffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000240)={0x0, {0x0, 0x0, 0x4}}) [ 433.387359][T22985] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 433.494145][T22985] 8021q: adding VLAN 0 to HW filter on device bond133 06:16:52 executing program 4: openat$pfkey(0xffffff9c, &(0x7f00000042c0), 0x0, 0x0) 06:16:52 executing program 2: openat$pfkey(0xffffff9c, &(0x7f0000000380), 0x40, 0x0) [ 433.908660][T23025] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 434.031496][T23025] 8021q: adding VLAN 0 to HW filter on device bond146 06:16:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={0x0}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={0x0}}, 0x0) 06:16:53 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e010", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:53 executing program 4: waitid(0x0, 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) 06:16:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) waitid(0x0, 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) 06:16:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={0x0}}, 0x0) [ 434.766100][T23075] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 434.902694][T23075] 8021q: adding VLAN 0 to HW filter on device bond134 [ 434.931452][T23078] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 435.067313][T23078] 8021q: adding VLAN 0 to HW filter on device bond147 06:16:53 executing program 5: openat$pfkey(0xffffff9c, &(0x7f0000000780), 0x8403, 0x0) 06:16:54 executing program 3: r0 = openat$uinput(0xffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000400)={0x6, 0x8001, 0x7fffffff}) 06:16:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0, r0) 06:16:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e010", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:54 executing program 2: r0 = openat$uinput(0xffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x0) 06:16:54 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000002c0)=0x3, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20044011, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) sendto$inet(r0, &(0x7f00000003c0)="e8fd8f6cd5f646ca6c49b24e37da96bbce6a454ed70388", 0xfffffffffffffeb7, 0x44048, &(0x7f00000000c0)={0x2, 0x0, @private}, 0x10) [ 436.063542][T23163] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:16:54 executing program 3: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000300)=""/4096) 06:16:54 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r2, &(0x7f0000000280)=""/4096, 0x1007) r3 = dup(r1) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @ipv4={'\x00', '\xff\xff', @empty}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r4}) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000001900070000000000000008000a"], 0x1c}}, 0x0) [ 436.185212][T23163] 8021q: adding VLAN 0 to HW filter on device bond148 [ 436.205524][T23165] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 436.474566][T23165] 8021q: adding VLAN 0 to HW filter on device bond135 06:16:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) flistxattr(r0, &(0x7f0000000240)=""/242, 0xf2) 06:16:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e010", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e71b0fb1f147a8378f3646", 0x13}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78}, 0x78) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 06:16:55 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:55 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="e0000001ac1414aa0000000003"], 0x1c) setsockopt$inet_mreqn(r0, 0x0, 0x25, &(0x7f0000000080)={@multicast1, @local}, 0xc) 06:16:55 executing program 3: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) [ 437.209342][T23253] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 437.254919][T23253] 8021q: adding VLAN 0 to HW filter on device bond149 [ 437.285090][T23254] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 437.344223][T23254] 8021q: adding VLAN 0 to HW filter on device bond136 06:16:56 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000940)={'batadv_slave_0\x00'}) 06:16:56 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:56 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e15312", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:56 executing program 4: setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) 06:16:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) [ 438.104976][T23338] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 438.328509][T23338] 8021q: adding VLAN 0 to HW filter on device bond150 06:16:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x28, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 438.483122][T23377] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 438.573921][T23377] 8021q: adding VLAN 0 to HW filter on device bond137 06:16:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000100)={@multicast2, @local, @remote}, 0xc) 06:16:57 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 439.027795][T23418] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 439.128219][T23418] 8021q: adding VLAN 0 to HW filter on device bond151 06:16:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) 06:16:59 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e15312", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:16:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='\n']}) 06:16:59 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x4bde, &(0x7f0000000080)=0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}}) io_submit(r0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0xe, 0x0, 0x3, 0x0, 0x0, r1, 0x0}]) 06:16:59 executing program 4: unshare(0x600) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) 06:16:59 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 440.747548][T23472] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 440.957728][T23472] 8021q: adding VLAN 0 to HW filter on device bond138 [ 440.969374][T23475] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 441.056509][T23475] 8021q: adding VLAN 0 to HW filter on device bond152 06:16:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() setpriority(0x1, r1, 0x0) 06:16:59 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) keyctl$revoke(0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 06:17:00 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000bc0)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:17:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003500)={0x1c, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:17:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x0) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e15312", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000040), 0x4) 06:17:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000540)={0x4c, 0x5a, 0x1}, 0x4c}}, 0x0) 06:17:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() r2 = getpid() sendmmsg$unix(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c, 0x1, 0x2, {r2}}}], 0x40}], 0x1, 0x0) [ 442.191903][T23569] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 442.320396][T23569] 8021q: adding VLAN 0 to HW filter on device bond139 [ 442.331719][T23568] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 442.483576][T23568] 8021q: adding VLAN 0 to HW filter on device bond153 06:17:01 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x490f, 0x4) 06:17:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newtaction={0x894, 0x30, 0x16065126a33bff1f, 0x0, 0x0, {}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404}], [@TCA_POLICE_PEAKRATE={0x404}, @TCA_POLICE_AVRATE={0x8}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x8, 0x0, 0x0, 0x0, 0x0, 0xb201}, {0x4, 0x0, 0x0, 0x0, 0x0, 0x5}}}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x894}}, 0x0) [ 442.726331][T23645] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.4'. 06:17:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b95", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x0) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x1600bd63, 0x0, &(0x7f0000000140)) 06:17:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8910, &(0x7f0000000300)={0x0, @l2tp={0x2, 0x0, @loopback, 0x3}, @rc, @ipx={0x4, 0x0, 0x0, "a0a1dcb9630a"}}) 06:17:02 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 06:17:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000003c0)) [ 443.530214][T23657] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 443.791483][T23657] 8021q: adding VLAN 0 to HW filter on device bond140 [ 443.807519][T23659] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 443.935097][T23659] 8021q: adding VLAN 0 to HW filter on device bond154 06:17:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000000)={0x0, 0xfe, '\x00', [@calipso={0x7, 0x40, {0x0, 0xe, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @hao={0xc9, 0x10, @empty}, @ra, @padn={0x1, 0x1, [0x0]}, @generic={0x0, 0x794, "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"}]}, 0x800) 06:17:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0xf, 0x0, &(0x7f0000000140)) 06:17:03 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x0) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000a00)) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 06:17:03 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b95", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xc, 0xffffffffffffffff, 0x28e}, 0x40) [ 445.207622][T23749] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:17:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0xf21a0924f8517367, 0x0, 0x0, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x24}}, 0x0) 06:17:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) 06:17:04 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000000)=0x2000000000000001, 0x4) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000800)=0x14000195e, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000300)={0x0, 0xcff, 0x80000001}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x140006, 0x0) [ 445.554364][T23749] 8021q: adding VLAN 0 to HW filter on device bond155 [ 445.570884][T23753] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:17:04 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f0000000080)=@isdn, 0x80) [ 445.804974][T23753] 8021q: adding VLAN 0 to HW filter on device bond141 06:17:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x3b, 0x0, &(0x7f0000000140)) 06:17:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x6, 0x21, 0x0, 0x0) 06:17:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b95", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 446.521448][T23836] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:17:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000005c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) [ 446.585732][T23836] 8021q: adding VLAN 0 to HW filter on device bond156 06:17:05 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 06:17:05 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 447.063638][T23878] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 447.184070][T23878] 8021q: adding VLAN 0 to HW filter on device bond142 06:17:05 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000100)=0x11, 0x4) 06:17:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 06:17:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) 06:17:06 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{}]}, 0x10) [ 447.610654][T23922] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 447.695408][T23922] 8021q: adding VLAN 0 to HW filter on device bond157 06:17:06 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) sendmsg$sock(r0, &(0x7f0000001740)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0}, 0x0) 06:17:06 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890b, &(0x7f0000000300)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @rc, @ipx={0x4, 0x0, 0x0, "a0a1dcb9630a"}}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000400)={'gretap0\x00', &(0x7f0000000380)={'gretap0\x00', 0x0, 0x0, 0x8, 0x4, 0x1ff, {{0x14, 0x4, 0x3, 0x5, 0x50, 0x68, 0x0, 0x6, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x18}, @local, {[@timestamp_prespec={0x44, 0xc, 0x8d, 0x3, 0x9, [{@dev={0xac, 0x14, 0x14, 0x28}, 0x34}]}, @rr={0x7, 0x7, 0x50, [@multicast2]}, @ssrr={0x89, 0x17, 0x87, [@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0xe}, @remote, @empty, @rand_addr=0x64010101]}, @cipso={0x86, 0x12, 0x2, [{0x5, 0xc, "9eaab0009610d610b53e"}]}]}}}}}) sendmsg$nl_route_sched(r1, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)=@deltfilter={0x34, 0x2d, 0x800, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0xfff3, 0xd}, {0xa, 0xb}, {0xd, 0x17}}, [@TCA_RATE={0x6, 0x5, {0x7, 0x7}}, @TCA_RATE={0x6, 0x5, {0x1, 0xb}}]}, 0x34}, 0x1, 0x0, 0x0, 0x2387435fdcb60d8d}, 0x440f0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x0, 0x5, &(0x7f0000000040)=@framed={{}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@private1, 0x10, r4}) 06:17:06 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000080)={'vlan0\x00', @ifru_names}) [ 448.425114][ T3122] ieee802154 phy0 wpan0: encryption failed: -22 [ 448.431619][ T3122] ieee802154 phy1 wpan1: encryption failed: -22 06:17:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 448.628365][T23970] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:17:07 executing program 2: unshare(0x20000000) unshare(0x60020600) [ 448.723342][T23970] 8021q: adding VLAN 0 to HW filter on device bond143 [ 448.943551][T24010] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:17:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sendmmsg$unix(r0, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x20}], 0x1, 0x0) [ 449.145137][T24010] 8021q: adding VLAN 0 to HW filter on device bond158 06:17:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x1600bd61, 0x0, &(0x7f0000000140)) 06:17:08 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:08 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x3, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000180)=""/224, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:17:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, 0x0, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x3e, 0x0, &(0x7f0000000140)) 06:17:08 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x23, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 450.202024][T24062] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 450.448688][T24062] 8021q: adding VLAN 0 to HW filter on device bond144 [ 450.474793][T24066] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:17:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x4020940d, &(0x7f0000000580)={"7fe32ce34e45120333cccd99283ab2ce"}) 06:17:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000000)={'veth1_macvtap\x00', @ifru_names}) [ 450.516624][ T56] Bluetooth: hci4: command 0x0406 tx timeout [ 450.575120][T24066] 8021q: adding VLAN 0 to HW filter on device bond159 06:17:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000000)={0x814, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x0, [0x0, 0x0, 0x100101]}}, [@INET_DIAG_REQ_BYTECODE={0x741, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x81, 0x1, "51cb5bca4ed533de5d00002000050d2289ab17ff2439fad90000000000000000000000000000000000000000000000000000000000000000000000a1f823d5c7a92922f0bf331507c6d6bf434420619182fecfb438ed9e08014aa979c13e02000028314e6b5404033eb6a98eb25092eeba0774943d0d4cf6f19a957def"}]}, 0x814}}, 0x0) 06:17:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:09 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, 0x0, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000300)={0x630a000000000000, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @rc, @ipx={0x4, 0x0, 0x0, "a0a1dcb9630a"}, 0x0, 0x0, 0x0, 0x7000000}) 06:17:10 executing program 3: socketpair(0x28, 0x1, 0x0, &(0x7f0000000440)) 06:17:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect(r0, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x80) [ 451.479277][T24147] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 451.600815][T24149] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 451.794287][T24149] 8021q: adding VLAN 0 to HW filter on device bond145 [ 451.807371][T24150] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 451.883744][T24150] 8021q: adding VLAN 0 to HW filter on device bond160 06:17:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000300)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @rc, @ipx={0x4, 0x0, 0x0, "a0a1dcb91600"}, 0x0, 0x0, 0x0, 0x7000000}) 06:17:10 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xe0, &(0x7f0000000180)=""/224, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:17:11 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e010", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, 0x0, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000280)={'netpci0\x00', @ifru_names}) 06:17:11 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000300)="cd", 0x1}, {&(0x7f0000000400)="c2", 0x1}, {&(0x7f0000000500)="44bdaec56214676c63efcd6c388efae10753dd7d2c409ba06939fda2e76ab0c50123fdf54f828ba930265db3366d8ddb6b26cde814c5e4198e739fb99d83b9ba6247570bf627930ae406cbcdb9f0bae6445225021bfe26034e1ab82f13a3349ce100eb5363ea53d1d4fd4e41e26162322e1be34286a257d1c45b65d0", 0x7c}, {&(0x7f0000000580)="3fe6afb10a556c5e4973220afe47d23bba0ed25da70c0f4bde7618abeb9e410662dac77254bb6ff129f45be2648dbc378fc34fa3d8fe037bd50d172cf2d6062c1fbbf7f4ca140d44d87e57362173837bc046263efd26d71e330f341114b30218cc478c873d986eee24ffdc76ed0f9f58a3d546e1f1dab8dd807d5b5731dcde4596e24dbbe6697ff72ed4c0978638090062f1c8f4b104e019976d9fe487f98e1f", 0xa0}, {&(0x7f0000000640)="2f5f3735d610b7e7d931ffa1a8c011855e688b87c881c3ce06af71cbe9a06443b1bbb27f302b8145fea4485a35bb624971db9ef95a2e13a0fd08304366b7a8ee98628c945d19852e5774a51c766ba117727c10c4ae30eba747561ce1fa395cbaf241436c536fd36bb8a81b9df15631a53b8b4cd209866809bf1310ef4a7f9c07d70b7ffed08ef4aaf37abffe3e747c46cf7942ab8a9f17d6e98a0483b3c7f01264b505f91676590f0f9fce54fd0d4e019d29972701644283fa", 0xb9}, {&(0x7f0000000700)="4fdc5a8b8098c4b4b98da8d243c145eef4f847236725fea4441caaf0addae1cc96eaea94122015ebd2e58f5e41f2f3aaef2d67c532deb6536ab118608bf85910009f64612ab9fb81ff8ad3e89685fb9519c4e49e9b7ca6e772c6dca339a15d9ff02f1781782d2a8fb926ccd12cf754e12deb5c121ab06e8faeb8280b70daa135d67a79110ed3f00565be1ee1", 0x8c}, {&(0x7f00000007c0)="2b246d0a866cc4a22735c75282d03edf56e1788e9f0dc1fe9b6ede56495a7dc4aabc66602aa207072886e1e27225552bd458549d88b032b2e0dded8c33d67804cbd58ed2c109f309a6021ea9add9061ef49b2075679a3364967d5e9c6518cceb67b6e1e3d455eb575dcadad1bfe04b576e93e4bd000bf295f57175864d8241a7aa475eaeb8338ca70f9330a554bde2034b51cfc0ba78", 0x96}, {&(0x7f0000000880)="ce39778c543b97195c593a8d6d102491c1dffcbb5118f91fc9aa255c9046ecfa2be8084f81fe7cd4d146c6a25f50901ab40ebee4fd4a88136160516bdb34ea940b72a252904941b643c676f97253e607103682230309d69977103917f9832f66be8279bf91a9e4a198c8426dc313b40a9cd35d026806c5b530fa263ae5a3f97838edae2cb4cfdf8816f3fdec079949c71c31ad5df9cc49ad4a21a912e5558637530827e0176daf6090bb9d0f644f2b0c0ef18d8a3c06bc6a827e7d6a23968766c0874c00217f23955f3d37e7e3aaf812c66806e4bc35ade6a1139cd6169958abcc9d468967fbe849c5c489f88b58c5", 0xef}, {&(0x7f0000000980)="7f46619231f12ae36685c3b38b779e88da99cf7de041c0ce169033bacd208fe50f601759be4ae14d6c9e4373093a071aef0c5b1f6cf62d17acc285276eed5f6e6b0224f08accb12bd2463b23054aa85de102a643397d0ca984b891dad82fb0b662502d7215d7a02d5b881a883eb8ec9f95c315f6b3c5c7dfd56bf6b0d69917d6e304b8ebbae441fc296d27bf95b39470bbf487639cdf7a1499c2b68b8a6c3f1490e8ce126fcfb82e75761a322902ede803d9554dad7699a733c4c254e534f07c1498bab8a286da0accace3545490ca2cd29bc1d331e0d78d05", 0xd9}, {&(0x7f0000000a80)="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", 0xb42}], 0xa}, 0x0) [ 452.726547][T24235] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 452.802902][T24235] 8021q: adding VLAN 0 to HW filter on device bond146 06:17:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)={0x3, 'vlan1\x00'}) 06:17:11 executing program 5: r0 = perf_event_open(&(0x7f0000000b80)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x5450, 0xffffffffffffffff) 06:17:11 executing program 3: perf_event_open(&(0x7f0000000b80)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b80)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 453.175218][T24274] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 453.264011][T24274] 8021q: adding VLAN 0 to HW filter on device bond161 06:17:12 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e010", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 453.663213][T24318] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 453.758194][T24318] 8021q: adding VLAN 0 to HW filter on device bond147 06:17:12 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x400454cd, &(0x7f0000000340)={0x0, 0x0}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) 06:17:12 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x700}, 0x0) 06:17:12 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:12 executing program 4: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0x5eaa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f00000002c0)="020e003f0004087e5bc5795e88a8", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 06:17:12 executing program 5: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000100a009500000000000000d5108dd01543e6c4a53b389eb81951007106d55c672ffea4b699315dfba1b3628f06c14bdcc765c1be4a3705a638dddde271fb5a275b433b017fd0"], &(0x7f0000000080)='syzkaller\x00', 0x5, 0xa6, &(0x7f0000000100)=""/166, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0x5eaa) recvmsg(0xffffffffffffffff, &(0x7f000002e800)={0x0, 0x0, &(0x7f000002e780)=[{&(0x7f000002e440)=""/169, 0xa9}, {&(0x7f000002e500)=""/33, 0x21}, {&(0x7f000002e540)=""/4, 0x4}, {&(0x7f000002e580)=""/61, 0x3d}, {&(0x7f000002e5c0)=""/114, 0x72}, {&(0x7f000002e640)=""/66, 0x42}, {&(0x7f000002e6c0)=""/140, 0x8c}], 0x7}, 0x10100) bpf$MAP_CREATE(0x0, &(0x7f000002e840)={0xc, 0x0, 0x8, 0x4, 0x844, 0x1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f00000002c0)="020e003f0004087e5bc5795e86dd", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='qdisc_dequeue\x00', r1}, 0x10) gettid() setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0xb, &(0x7f00000027c0), 0x4) 06:17:13 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e010", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 454.596113][T24366] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 454.696169][T24366] 8021q: adding VLAN 0 to HW filter on device bond162 06:17:13 executing program 2: perf_event_open(&(0x7f0000000b80)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 454.871963][T24395] ===================================================== [ 454.878994][T24395] BUG: KMSAN: uninit-value in erspan_xmit+0x21b9/0x3ea0 [ 454.886190][T24395] CPU: 0 PID: 24395 Comm: syz-executor.4 Not tainted 5.12.0-rc6-syzkaller #0 [ 454.895161][T24395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.905345][T24395] Call Trace: [ 454.908653][T24395] dump_stack+0x24c/0x2e0 [ 454.913148][T24395] kmsan_report+0xfb/0x1e0 [ 454.917695][T24395] __msan_warning+0x5c/0xa0 [ 454.923381][T24395] erspan_xmit+0x21b9/0x3ea0 [ 454.928009][T24395] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 454.934108][T24395] ? validate_xmit_xfrm+0xd5/0x1b90 [ 454.939422][T24395] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 454.945302][T24395] ? erspan_tunnel_init+0x470/0x470 [ 454.950577][T24395] xmit_one+0x2b6/0x760 [ 454.954903][T24395] dev_hard_start_xmit+0x196/0x420 [ 454.960061][T24395] sch_direct_xmit+0x57c/0x1a60 [ 454.965104][T24395] __qdisc_run+0x35b/0x490 [ 454.969612][T24395] __dev_queue_xmit+0x26ad/0x4600 [ 454.975220][T24395] dev_queue_xmit+0x4b/0x60 [ 454.979769][T24395] __bpf_redirect+0x1461/0x16b0 [ 454.984723][T24395] ? kmsan_get_metadata+0x116/0x180 [ 454.989964][T24395] bpf_clone_redirect+0x4a1/0x660 [ 454.995038][T24395] ___bpf_prog_run+0x2b78/0xb950 [ 455.000094][T24395] ? kmsan_get_shadow_origin_ptr+0x29/0xb0 [ 455.006026][T24395] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 455.012136][T24395] ? bpf_csum_level+0x760/0x760 [ 455.017020][T24395] __bpf_prog_run512+0x12e/0x190 [ 455.021990][T24395] ? __bpf_trace_sched_kthread_work_execute_start+0xd0/0x140 [ 455.029474][T24395] ? kmsan_get_metadata+0x116/0x180 [ 455.034723][T24395] ? kmsan_get_metadata+0x116/0x180 [ 455.040051][T24395] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 455.046006][T24395] ? __msan_get_context_state+0x9/0x20 [ 455.051506][T24395] ? memcg_slab_post_alloc_hook+0x41/0xe50 [ 455.057435][T24395] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 455.063554][T24395] ? should_fail+0x72/0x9e0 [ 455.068182][T24395] ? psi_task_change+0x330/0x7e0 [ 455.073227][T24395] ? kmsan_get_metadata+0x116/0x180 [ 455.078499][T24395] ? kmsan_get_metadata+0x116/0x180 [ 455.083742][T24395] ? kmsan_get_metadata+0x116/0x180 [ 455.088981][T24395] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 455.094832][T24395] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 455.101474][T24395] ? ktime_get+0x390/0x470 [ 455.106047][T24395] ? kmsan_get_metadata+0x4f/0x180 [ 455.111192][T24395] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 455.117044][T24395] ? __bpf_prog_run480+0x190/0x190 [ 455.122282][T24395] bpf_test_run+0x53f/0xe60 [ 455.126929][T24395] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 455.132968][T24395] bpf_prog_test_run_skb+0x1914/0x3500 [ 455.139560][T24395] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 455.145798][T24395] __do_sys_bpf+0xbe6f/0x1aba0 [ 455.152710][T24395] ? __msan_get_context_state+0x9/0x20 [ 455.158237][T24395] ? __msan_instrument_asm_store+0x22/0x130 [ 455.164178][T24395] ? __msan_get_context_state+0x9/0x20 [ 455.170369][T24395] ? irqentry_exit+0x12/0x50 [ 455.178651][T24395] ? sysvec_apic_timer_interrupt+0x86/0xf0 [ 455.184602][T24395] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 455.190879][T24395] ? kmsan_internal_set_origin+0x85/0xc0 [ 455.196634][T24395] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 455.203032][T24395] ? __msan_instrument_asm_store+0x107/0x130 [ 455.209069][T24395] ? kmsan_get_metadata+0x116/0x180 [ 455.214326][T24395] ? kmsan_get_metadata+0x116/0x180 [ 455.220009][T24395] __se_sys_bpf+0x8e/0xa0 [ 455.224653][T24395] __ia32_sys_bpf+0x4a/0x70 [ 455.229195][T24395] __do_fast_syscall_32+0x127/0x180 [ 455.235452][T24395] do_fast_syscall_32+0x6a/0xc0 [ 455.240630][T24395] do_SYSENTER_32+0x73/0x90 [ 455.245185][T24395] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 455.252163][T24395] RIP: 0023:0xf7f23549 [ 455.256269][T24395] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 455.275916][T24395] RSP: 002b:00000000f54fc5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 455.284379][T24395] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 455.292463][T24395] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 455.300467][T24395] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 455.309180][T24395] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 455.317190][T24395] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 455.325291][T24395] [ 455.327726][T24395] Uninit was created at: [ 455.331972][T24395] kmsan_internal_poison_shadow+0x5c/0xf0 [ 455.337742][T24395] kmsan_slab_alloc+0x8e/0xe0 [ 455.342554][T24395] __kmalloc_node_track_caller+0xa4f/0x1470 [ 455.348480][T24395] pskb_expand_head+0x25e/0x1e20 [ 455.353562][T24395] erspan_xmit+0xa04/0x3ea0 [ 455.358112][T24395] xmit_one+0x2b6/0x760 [ 455.362301][T24395] dev_hard_start_xmit+0x196/0x420 [ 455.367432][T24395] sch_direct_xmit+0x57c/0x1a60 [ 455.372307][T24395] __qdisc_run+0x35b/0x490 [ 455.376762][T24395] __dev_queue_xmit+0x26ad/0x4600 [ 455.381828][T24395] dev_queue_xmit+0x4b/0x60 [ 455.386363][T24395] __bpf_redirect+0x1461/0x16b0 [ 455.391239][T24395] bpf_clone_redirect+0x4a1/0x660 [ 455.396284][T24395] ___bpf_prog_run+0x2b78/0xb950 [ 455.401254][T24395] __bpf_prog_run512+0x12e/0x190 [ 455.406315][T24395] bpf_test_run+0x53f/0xe60 [ 455.410939][T24395] bpf_prog_test_run_skb+0x1914/0x3500 [ 455.416519][T24395] __do_sys_bpf+0xbe6f/0x1aba0 [ 455.421317][T24395] __se_sys_bpf+0x8e/0xa0 [ 455.425684][T24395] __ia32_sys_bpf+0x4a/0x70 [ 455.430319][T24395] __do_fast_syscall_32+0x127/0x180 [ 455.436425][T24395] do_fast_syscall_32+0x6a/0xc0 [ 455.441328][T24395] do_SYSENTER_32+0x73/0x90 [ 455.445870][T24395] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 455.452341][T24395] ===================================================== [ 455.459285][T24395] Disabling lock debugging due to kernel taint [ 455.681526][T24410] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:17:14 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)='y', 0x1}], 0x1}, 0x5c0c1) sendmsg$inet(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 455.751123][T24410] 8021q: adding VLAN 0 to HW filter on device bond148 06:17:14 executing program 5: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000100a009500000000000000d5108dd01543e6c4a53b389eb81951007106d55c672ffea4b699315dfba1b3628f06c14bdcc765c1be4a3705a638dddde271fb5a275b433b017fd0"], &(0x7f0000000080)='syzkaller\x00', 0x5, 0xa6, &(0x7f0000000100)=""/166, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0x5eaa) recvmsg(0xffffffffffffffff, &(0x7f000002e800)={0x0, 0x0, &(0x7f000002e780)=[{&(0x7f000002e440)=""/169, 0xa9}, {&(0x7f000002e500)=""/33, 0x21}, {&(0x7f000002e540)=""/4, 0x4}, {&(0x7f000002e580)=""/61, 0x3d}, {&(0x7f000002e5c0)=""/114, 0x72}, {&(0x7f000002e640)=""/66, 0x42}, {&(0x7f000002e6c0)=""/140, 0x8c}], 0x7}, 0x10100) bpf$MAP_CREATE(0x0, &(0x7f000002e840)={0xc, 0x0, 0x8, 0x4, 0x844, 0x1, 0x3f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe, 0x0, &(0x7f00000002c0)="020e003f0004087e5bc5795e86dd", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='qdisc_dequeue\x00', r1}, 0x10) gettid() setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0xb, &(0x7f00000027c0), 0x4) 06:17:14 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:14 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 456.269044][T24395] ===================================================== [ 456.276044][T24395] BUG: KMSAN: uninit-value in erspan_xmit+0x21b9/0x3ea0 [ 456.283027][T24395] CPU: 1 PID: 24395 Comm: syz-executor.4 Tainted: G B 5.12.0-rc6-syzkaller #0 [ 456.293211][T24395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.303313][T24395] Call Trace: [ 456.306626][T24395] dump_stack+0x24c/0x2e0 [ 456.312029][T24395] kmsan_report+0xfb/0x1e0 [ 456.316494][T24395] __msan_warning+0x5c/0xa0 [ 456.321206][T24395] erspan_xmit+0x21b9/0x3ea0 [ 456.326113][T24395] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 456.332309][T24395] ? validate_xmit_xfrm+0xd5/0x1b90 [ 456.337558][T24395] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 456.343405][T24395] ? erspan_tunnel_init+0x470/0x470 [ 456.348652][T24395] xmit_one+0x2b6/0x760 [ 456.352850][T24395] dev_hard_start_xmit+0x196/0x420 [ 456.358051][T24395] sch_direct_xmit+0x57c/0x1a60 [ 456.363163][T24395] __qdisc_run+0x35b/0x490 [ 456.367650][T24395] __dev_queue_xmit+0x26ad/0x4600 [ 456.372816][T24395] dev_queue_xmit+0x4b/0x60 [ 456.377363][T24395] __bpf_redirect+0x1461/0x16b0 [ 456.382248][T24395] ? kmsan_get_metadata+0x116/0x180 [ 456.387659][T24395] bpf_clone_redirect+0x4a1/0x660 [ 456.392729][T24395] ___bpf_prog_run+0x2b78/0xb950 [ 456.399806][T24395] ? bpf_csum_level+0x760/0x760 [ 456.404792][T24395] __bpf_prog_run512+0x12e/0x190 [ 456.409855][T24395] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 456.415788][T24395] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 456.421993][T24395] ? __perf_event_task_sched_in+0xbc7/0xdb0 [ 456.428200][T24395] ? kmsan_get_metadata+0x116/0x180 [ 456.433455][T24395] ? kmsan_get_metadata+0x116/0x180 [ 456.438811][T24395] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 456.444681][T24395] ? kmsan_get_metadata+0x116/0x180 [ 456.450359][T24395] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 456.456214][T24395] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 456.462412][T24395] ? kmsan_get_metadata+0x116/0x180 [ 456.467770][T24395] ? kmsan_get_metadata+0x116/0x180 [ 456.472999][T24395] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 456.478839][T24395] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 456.484953][T24395] ? ktime_get+0x390/0x470 [ 456.489444][T24395] ? kmsan_get_metadata+0x4f/0x180 [ 456.494606][T24395] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 456.500451][T24395] ? __bpf_prog_run480+0x190/0x190 [ 456.506046][T24395] bpf_test_run+0x53f/0xe60 [ 456.511129][T24395] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 456.517085][T24395] bpf_prog_test_run_skb+0x1914/0x3500 [ 456.522640][T24395] ? __bpf_prog_test_run_raw_tp+0x3e0/0x3e0 [ 456.528577][T24395] __do_sys_bpf+0xbe6f/0x1aba0 [ 456.533484][T24395] ? __msan_get_context_state+0x9/0x20 [ 456.539084][T24395] ? __msan_instrument_asm_store+0x22/0x130 [ 456.545023][T24395] ? __msan_get_context_state+0x9/0x20 [ 456.550531][T24395] ? irqentry_exit+0x12/0x50 [ 456.555506][T24395] ? sysvec_apic_timer_interrupt+0x86/0xf0 [ 456.561346][T24395] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 456.567538][T24395] ? kmsan_internal_set_origin+0x85/0xc0 [ 456.574769][T24395] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 456.580885][T24395] ? __msan_instrument_asm_store+0x107/0x130 [ 456.586902][T24395] ? kmsan_get_metadata+0x116/0x180 [ 456.592318][T24395] ? kmsan_get_metadata+0x116/0x180 [ 456.597560][T24395] __se_sys_bpf+0x8e/0xa0 [ 456.602884][T24395] __ia32_sys_bpf+0x4a/0x70 [ 456.607555][T24395] __do_fast_syscall_32+0x127/0x180 [ 456.612913][T24395] do_fast_syscall_32+0x6a/0xc0 [ 456.617811][T24395] do_SYSENTER_32+0x73/0x90 [ 456.622351][T24395] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 456.628718][T24395] RIP: 0023:0xf7f23549 [ 456.632809][T24395] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 456.652534][T24395] RSP: 002b:00000000f54fc5fc EFLAGS: 00000296 ORIG_RAX: 0000000000000165 [ 456.661076][T24395] RAX: ffffffffffffffda RBX: 000000000000000a RCX: 0000000020000140 [ 456.669080][T24395] RDX: 0000000000000048 RSI: 0000000000000000 RDI: 0000000000000000 [ 456.677096][T24395] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 456.685113][T24395] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 456.693114][T24395] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 456.701149][T24395] [ 456.703488][T24395] Uninit was created at: [ 456.707725][T24395] kmsan_internal_poison_shadow+0x5c/0xf0 [ 456.713656][T24395] kmsan_slab_alloc+0x8e/0xe0 [ 456.718383][T24395] __kmalloc_node_track_caller+0xa4f/0x1470 [ 456.724310][T24395] pskb_expand_head+0x25e/0x1e20 [ 456.729273][T24395] erspan_xmit+0xa04/0x3ea0 [ 456.733805][T24395] xmit_one+0x2b6/0x760 [ 456.737994][T24395] dev_hard_start_xmit+0x196/0x420 [ 456.743239][T24395] sch_direct_xmit+0x57c/0x1a60 [ 456.748121][T24395] __qdisc_run+0x35b/0x490 [ 456.752734][T24395] __dev_queue_xmit+0x26ad/0x4600 [ 456.757910][T24395] dev_queue_xmit+0x4b/0x60 [ 456.763506][T24395] __bpf_redirect+0x1461/0x16b0 [ 456.768387][T24395] bpf_clone_redirect+0x4a1/0x660 [ 456.773529][T24395] ___bpf_prog_run+0x2b78/0xb950 [ 456.778523][T24395] __bpf_prog_run512+0x12e/0x190 [ 456.784010][T24395] bpf_test_run+0x53f/0xe60 [ 456.789283][T24395] bpf_prog_test_run_skb+0x1914/0x3500 [ 456.795566][T24395] __do_sys_bpf+0xbe6f/0x1aba0 [ 456.800371][T24395] __se_sys_bpf+0x8e/0xa0 [ 456.804751][T24395] __ia32_sys_bpf+0x4a/0x70 [ 456.809290][T24395] __do_fast_syscall_32+0x127/0x180 [ 456.814522][T24395] do_fast_syscall_32+0x6a/0xc0 [ 456.820120][T24395] do_SYSENTER_32+0x73/0x90 [ 456.824650][T24395] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 456.831021][T24395] ===================================================== 06:17:15 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, 0x0, 0x0) [ 457.080805][T24456] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 457.186822][T24456] 8021q: adding VLAN 0 to HW filter on device bond163 06:17:16 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0x5eaa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f00000002c0)="020e003f0004087e5bc5795e86dd", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0xb, &(0x7f00000027c0), 0x4) [ 457.451976][T24493] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 457.515984][T24493] 8021q: adding VLAN 0 to HW filter on device bond149 06:17:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="9cffffffffffba007a9b807a8100252b88a8", 0x5ee}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002180)={0x0, 0xa, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 458.185152][T24534] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 458.275904][T24534] 8021q: adding VLAN 0 to HW filter on device bond164 [ 458.435378][T24573] batman_adv: batadv0: adding TT local entry ba:00:7a:9b:80:7a to non-existent VLAN 1323 [ 458.515981][T24574] batman_adv: batadv0: adding TT local entry ba:00:7a:9b:80:7a to non-existent VLAN 1323 06:17:17 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:17 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x400454dc, &(0x7f0000000340)={0x0, 0x0}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) 06:17:17 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f00000003c0)=@can, 0x80, &(0x7f0000000180)}, 0x8004804) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000037c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000003640)=[{0x0}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000300)=""/52, 0x34}, {0x0}, {&(0x7f0000003580)=""/183, 0xb7}], 0x5, &(0x7f00000036c0)=""/250, 0xfa}, 0x2020) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0xfffffffffffffe0c, &(0x7f0000000680)=[{&(0x7f0000005600)=""/102380, 0x1731f}], 0x1, 0x0, 0x60}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x800) 06:17:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="9cffffffffffba007a9b807a8100252b88a8", 0x5ee}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002180)={0x0, 0xa, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 06:17:17 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0x5eaa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f00000002c0)="020e003f0004087e5bc5795e86dd", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0xb, &(0x7f00000027c0), 0x4) [ 459.405019][T24587] batman_adv: batadv0: adding TT local entry ba:00:7a:9b:80:7a to non-existent VLAN 1323 [ 459.418213][T24584] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 459.589899][T24584] 8021q: adding VLAN 0 to HW filter on device bond150 [ 459.610376][T24586] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 459.734494][T24586] 8021q: adding VLAN 0 to HW filter on device bond165 06:17:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="9cffffffffffba007a9b807a8100252b88a8", 0x5ee}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002180)={0x0, 0xa, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 06:17:18 executing program 5: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xf54}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x283, &(0x7f0000000780)='bdev!)-%+wlan\x00p\x00\x00\x01\x00Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;YE\xec\x8c;\xf7\xcc\xa7\x8b6\n\xbe\x01\x01\xae\xb6\f4\x87\xd9j\xd8\x0e\xc2\x10\xb1\x7f\x95\x01fE\xaea\x10\x8f\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xd6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d\xaa\b\xe4\"\x1c\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8by}/\x8cw\xe6\x99\xfe \x84]8\x940U\xb3B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e\xad\xa1\xfcN\x88`\xbbj\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k\x8c\x1dTi\xafq\xde\x06/ \x93O.\xe5<0\xfa\b\x82\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\r\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\xc8\x15_>\xe6\xfc\xb9R\x06\xcd/\x87\xeaP\x9b\xdf5\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\xc5#\x92\xa3\xf52)2\xd3\xa02q\xdb\xe4\xe3\x97\x9d\xbc\xc9\xf8\x00\x00\x00\x00\x00\xcbxak\x9f-\xee\x8d\xd4\xc42\xa7\xe1#\\B\xb9\xdf\xd8\xda\xa8k\x8eV\xeau\r\x017\xb66\xb1\x00\x1a!\xb5\xc9\xd5\x06\xf2\xd5\xf8\xc3\xea\xcdZ+\xcd\xa2\xb7@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00U\xdd6\x8d\xd0\x01\x05\x19\xc9(\xb5\xe6^\xb0\xf1\xdd4\x16\xcc\x9f\x01j\xf7Q\xdf\x985\xc3F\x04\xfb\x10\xd8\x0e\x1f!-\x04d\xfb\x13q\x7f\xfb\xb9\x81\xe8\x7f\xe9\x01\xd3\xd0\x88a\xd09-\xf5\xf6\xca\x9c\"\xec\xc4\xd4\x950*\x91PDL\xd5@\xcda_\xdb\xebff\xafd\xb7z\x1d\x99\xbd\xc6P\xfa\x99\x04$\xb2\xcf0#\x84\x91\f\xf4\x17m\a-Gr)\x7f\x92-M\x19IQ%&\xed\xe90\xc0k\xd3\"\xee\xe7\xa4\xd84d$\t\xa9\n\x90\x1dE\xb2\xb2\x00\x1c\x97A\xde\xf8\xe2W%\xe9\xca\xd5\xf58)f\x85\x13|u\xa1%\xbd\xcf\xfe \x99\xb0C\xf5\xf2\xbf\x96el'}, 0x30) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x0, 0x2}, 0x0, 0x78f4, 0x200, 0x0, 0x0, 0x0, 0x143, 0x0, 0xfffff034, 0x0, 0x80e}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 06:17:19 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@mark={{0x14}}], 0x18}, 0x0) 06:17:19 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 460.594261][T24668] batman_adv: batadv0: adding TT local entry ba:00:7a:9b:80:7a to non-existent VLAN 1323 06:17:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000300)=0x5eaa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f00000002c0)="020e003f0004087e5bc5795e86dd", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x88, 0xb, &(0x7f00000027c0), 0x4) [ 461.075626][T24675] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 461.238520][T24675] 8021q: adding VLAN 0 to HW filter on device bond166 06:17:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="9cffffffffffba007a9b807a8100252b88a8", 0x5ee}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002180)={0x0, 0xa, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 461.468909][T24712] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 06:17:20 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f776d067cae8f0b414a5b43451c0e17a606fec6890123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70eaec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf00000000000000000000000000006fc0000000000000000000000200e27d45d54b107c8c247f195e32f13799d67074f332ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27ad2a986e0e244bd117252e47ffda1a869db7135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de3749f8bc8143df20d13c37db269971080fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f65974b84c16fd56ee452e411d75ab7613b644ba7580b2a0942394ed1577517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd644b4a44b807c9765cc7ef43c3cc0a6ad3d3976656d475dd2ed7890002003884e042acb104431333b50ff695516c1dd2e35f09c7a1f97f9561f62837e1d38eab98e6a7285bb0c6c1d0b9abc4b5705eb1073fe63e88f6ff7e510c2795288a69aa52ff32a89c9bd496d5d61d02cd950200226b3098ec9215fcf5becbfd7b53b4c65b74873ae66ba6d7376bc7354c34a49c0421c2000000000000000000000000000000005e47c1670fc64665a1a3dea938412ca0c34481f906105b896d62f703c498a564ff343653340a395c8674f89d0c0ef2a917688e6e715d10304f0598f4d84eac3f274bd6bf8bf4ff1debec97688098ba400ee2af878a1393280849e0bca76d8efc414aa97260b9083b2f1bd26805c2f03779e38cc8053e873fc47bf325faa840fd945cedfcd552387c913215cdef271e32cc650d9703740dfad32562f743a8ab4c7a8ee847ac1a196f9d479a87c3a49659521c7856b5933cd0846e22726487129139711272c3ee6b0bb8b192f03ea887f05fd9b87d19ef681c1e0a87a9e467e6082b267ac473ddbb2972f9e6cade9cf939262f007c22728040ebd31f581b1e23bcda95b2d75a6a14b0c17775d1bf5a443670f49cd5302882c342b72bd9957beb3891fbe7025afc604997a23c50111c3525872df4df58e973659004fea024389347402d21310612ef949083fbd7d40e36af5a4a4159f53aac141395dd106567de87b043ae91c67bd1dfc2e5133c60f7616ec546584132d47c01eadca4d08e6b38d5a5a779bb960640d39413c503b3d2823d7c1fb0476e1081e0af97dc58e59a1becd660c689fa807579b746cff9d89c1415385fe30d8f484d6ef067ed1d2837c6dc766294a170fb9bc685c5ce0c17f64b40a0ea3a2604ac879f48de87eff2e59d1e64743c83711b2be746a45514d74f6597b29c897e720ea851cf386d11801242ec42061389c78eb0b933f669f69bfe9bd6e8d3154b4c7c11aa685ef622bc8f00000000000000000000007c98226f370fa3ced2a0f5f08b874e86e12129f4274cc8c79a744937993a5c5d4d6dd32491719f289fc3c91c50b0890cfd2597fb326f56c719d1870adf4397768ec93a24424c0902aa1555222dd1be8865fe38e71d6a86c38e179628b88db29ec6ec7917d9abe7c8c970086d4386b8faae3311b4da856d3a8bc82fefa5ca00aaf48172eae0beedac22e9bfeb4748237adf01e8b3603ebd822b3a0cc0ea1f42d09dece446876b42988518ef00fc0a09833bfbd1b4e5d940aabb43ef6c8aebc4177eaf41bb888d32796ac7ccc64621a1f4646c1ab4f0dc1d4cdadc5a1d9b3f4598cfbce5e1930d13e4c7df6170e7fa908f73aa8f24609da1ecf9bc048cc878d0aab27a72566edd86a3e3cafb1cd5905a46f157bd7a8f58123043d400"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000300)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f00000002c0)="020e003f0004087e5bc5795e86dd", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 461.713384][T24712] 8021q: adding VLAN 0 to HW filter on device bond151 06:17:20 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) close(r0) 06:17:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080), 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) [ 462.157001][T24756] batman_adv: batadv0: adding TT local entry ba:00:7a:9b:80:7a to non-existent VLAN 1323 06:17:20 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x0) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:21 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, &(0x7f0000000080), 0x301) 06:17:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="9cffffffffffba007a9b807a8100252b88a8", 0x5ee}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 06:17:21 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) listen(r0, 0x0) [ 462.757047][T24764] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 06:17:21 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000001800)='./file1\x00', 0x320, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') [ 462.885185][T24764] 8021q: adding VLAN 0 to HW filter on device bond167 [ 462.895217][T24767] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 462.954485][T24767] 8021q: adding VLAN 0 to HW filter on device bond152 [ 463.214779][T24840] batman_adv: batadv0: adding TT local entry ba:00:7a:9b:80:7a to non-existent VLAN 1323 06:17:22 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_opts(r0, 0x0, 0x1, 0x0, 0x0) 06:17:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="9cffffffffffba007a9b807a8100252b88a8", 0x5ee}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 06:17:22 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x0) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="349b5745e6471e2ac113f99230a5b9d125388658ac3ac8b6793ab01e1cf5d23ce7211f25a0fa8bf6a29e24621ea12625c3aa86f61114547a9439a12b31b38d6a5720d1768f8580ae96a31f096e50c1fcea8249a95ecc3c4d3e5864f1840040c5a0549e2430e006d55cec572fd835f886454cacbec51f6fc799d159722148924ce6d4531e332b6f08b9ac0cb4e4a5784b0e5fe0bde42aa8973599affad6bc007f9a68fda9fa6cbc5eb50956c7b372e425e38599", @ANYRES16, @ANYBLOB="0001000500000000000063ca009a000000000008009a000000000008009a0001000000b1df69584646853be60fff4c3848351ca3256605f72b8aa1de9984d291350fd3c574b2f533914d7d7643a397c93c78f3f8fcb7fd9238106c31f2e5afe287d5e0947808a918118b51335fe4e8899f52218881e19f0000ffffa7403a972be42961c0900075ebfcf2ba035a8c3b7c628e4d18bf03074af671baf5346e9d3f4d25742175b88e96a6e809606d4fe46c8be7fb9488a1a304e9ff7d363919a8e7a51b4a904f8e7c5f2464d300"/214], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3ca, 0x500, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000600)) r4 = socket(0x10, 0x803, 0x0) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv2(r5, &(0x7f0000000340)=[{&(0x7f0000000040)=""/74, 0x4a}], 0x1, 0x0, 0x0, 0x9) sendmsg$NL80211_CMD_NEW_MPATH(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="a000be3ca730e1531200006b9558e0104e", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25170000000a001a000802110000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41}, 0x20004080) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x41c0}, 0x4) sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000500)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001b00)=ANY=[@ANYRES64=r5, @ANYRES64=r2, @ANYRESOCT], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x4000) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c00000010008556fde45f100000040000000000", @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000854b83f958fb9a80c45870892b03c0481a522f3ff823d7d186e076c0391beead57df8fce917640d2794b52530596612e3ad86f787294c10e173c26cebd51a757608f35be99d54587171bd8d09cc42d6516c22ce5b4682acde914bdce7abee97a779232d104c5f774e7f795476cdad2aa07e08be64162d3c800513e1d30306269b2a1ba6a50817ef9c6a03599d0a7bd5d1e6ccdb579945e5d2ee6edc49879452c15cc2aa15c244c2d50c5d1e3d9c253fa38db45cd72"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000640)=@newlink={0x78, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10044}, [@IFLA_LINKINFO={0x50, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x40, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x2}, @IFLA_IPTUN_FLOWINFO={0x8}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x2}, @IFLA_IPTUN_LINK={0x8, 0x1, r6}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x78}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800001, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) 06:17:22 executing program 4: r0 = socket$inet6(0x18, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x3b, 0x0, &(0x7f0000000100)={0x18, 0x2}, 0xc) 06:17:22 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 06:17:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) [ 464.247408][T24854] batman_adv: batadv0: adding TT local entry ba:00:7a:9b:80:7a to non-existent VLAN 1323 [ 464.317186][T24856] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 464.409176][T24856] 8021q: adding VLAN 0 to HW filter on device bond168 [ 464.439026][T24859] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 464.557916][T24859] 8021q: adding VLAN 0 to HW filter on device bond153 06:17:23 executing program 4: r0 = socket$inet6(0x18, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x18, 0x2}, 0xc) 06:17:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@nfc={0x103, 0x14}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000040)="9cffffffffffba007a9b807a8100252b88a8", 0x5ee}], 0x1}, 0x0)