5ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:28 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 501.836427] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:28 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x28c4422, &(0x7f00000001c0)) 12:20:28 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r3, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@GTPA_TID={0xc, 0x3, 0x3}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_NET_NS_FD={0x8, 0x7, r2}]}, 0x38}, 0x1, 0x0, 0x0, 0x42}, 0x4080) bind$bt_sco(r2, &(0x7f00000001c0)={0x1f, @none}, 0x8) ioctl$BLKPG(r0, 0x90000915, 0x0) [ 501.959285] 8021q: adding VLAN 0 to HW filter on device bond11 [ 501.979860] bond0: Enslaving bond11 as an active interface with an up link 12:20:28 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 502.077347] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 502.086673] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 502.121340] loop4: p2 start 420544512 is beyond EOD, truncated [ 502.142392] loop4: p3 start 2114410187 is beyond EOD, truncated 12:20:28 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 502.170324] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 502.199155] loop4: p6 start 3496214528 is beyond EOD, truncated [ 502.219985] loop4: p7 start 1581527914 is beyond EOD, truncated 12:20:28 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 502.497135] bond0: Releasing backup interface bond11 [ 502.514800] bond11 (unregistering): Released all slaves [ 502.619687] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 502.633632] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 502.647174] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 502.667446] loop4: p2 start 420544512 is beyond EOD, truncated [ 502.685909] loop4: p3 start 2114410187 is beyond EOD, truncated [ 502.705303] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:20:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x8000000, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:20:29 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4442, &(0x7f00000001c0)) 12:20:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x21, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:29 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) [ 502.716422] 8021q: adding VLAN 0 to HW filter on device bond11 [ 502.724620] loop4: p6 start 3496214528 is beyond EOD, truncated [ 502.733506] bond0: Enslaving bond11 as an active interface with an up link [ 502.737360] loop4: p7 start 1581527914 is beyond EOD, truncated 12:20:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x1903, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:29 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 502.901894] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x22, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:29 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) [ 503.025277] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 503.031132] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:20:29 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)={[], [], 0x2}) 12:20:29 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x20cc0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x801, 0x0) ioctl$BLKPG(r0, 0x90000915, 0x0) [ 503.088974] loop4: p2 start 420544512 is beyond EOD, truncated [ 503.102308] 8021q: adding VLAN 0 to HW filter on device bond12 [ 503.125426] bond0: Enslaving bond12 as an active interface with an up link [ 503.133785] loop4: p3 start 2114410187 is beyond EOD, truncated [ 503.161770] EXT4-fs: 35 callbacks suppressed [ 503.161781] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 503.174589] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:20:29 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)={[], [], 0x3}) [ 503.206431] loop4: p6 start 3496214528 is beyond EOD, truncated [ 503.228399] loop4: p7 start 1581527914 is beyond EOD, truncated [ 503.258539] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 503.273694] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 503.298293] loop4: p2 start 420544512 is beyond EOD, truncated [ 503.320780] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 503.332492] loop4: p3 start 2114410187 is beyond EOD, truncated [ 503.357437] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:20:29 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)={[], [], 0x4}) [ 503.369583] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 503.388944] loop4: p6 start 3496214528 is beyond EOD, truncated [ 503.407153] loop4: p7 start 1581527914 is beyond EOD, truncated [ 503.518166] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 503.545936] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 503.642771] bond0: Releasing backup interface bond12 [ 503.665329] bond12 (unregistering): Released all slaves [ 503.713169] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xa000000, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:20:30 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)={[], [], 0x5}) 12:20:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x1c00, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x23, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:30 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) r3 = syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="503ee0", 0x3, 0xae5c}], 0x210008, &(0x7f00000004c0)=ANY=[@ANYBLOB='/dev/md0\x00,/dev/md0\x00,defcontext=root,euid<', @ANYRESDEC=0xee01, @ANYBLOB=',func=KEXEC_INITRAMFS_CHECK,subj_type=/dev/md0\x00,fowner>', @ANYRESDEC=0xee00, @ANYBLOB="8476127cb3bc04cf96bc05cccf1c29ac5d141e49f1fbf3471fb87f49e678e8"]) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1c, &(0x7f0000000300)="dc30a11f825ed8c89de3315272fbefeb9232ab047fde2951be2cac284c6f332b51", 0x21) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x5, &(0x7f0000000180)=""/9) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r5, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {{}, {@val={0x8, 0x3, r6}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x1) r7 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400204) ioctl$KVM_GET_DEBUGREGS(r7, 0x8080aea1, &(0x7f0000000280)) unlinkat(r3, &(0x7f0000000240)='./file0\x00', 0x0) [ 503.838211] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 503.840173] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 503.870136] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 503.877003] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 503.890899] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 503.913994] loop4: p2 start 420544512 is beyond EOD, truncated 12:20:30 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)={[], [], 0x6}) [ 503.944504] loop4: p3 start 2114410187 is beyond EOD, truncated [ 503.972673] 8021q: adding VLAN 0 to HW filter on device bond12 [ 503.979174] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 504.000379] bond0: Enslaving bond12 as an active interface with an up link [ 504.011072] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop5 [ 504.018541] loop4: p6 start 3496214528 is beyond EOD, truncated [ 504.042963] loop4: p7 start 1581527914 is beyond EOD, truncated [ 504.055547] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 504.099269] EXT4-fs (sda1): Unrecognized mount option "" or missing value 12:20:30 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)={[], [], 0x7}) [ 504.183838] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 504.200197] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 504.216899] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 504.227756] loop4: p2 start 420544512 is beyond EOD, truncated 12:20:30 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)={[], [], 0x10}) [ 504.245381] loop4: p3 start 2114410187 is beyond EOD, truncated [ 504.261439] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 504.284065] loop4: p6 start 3496214528 is beyond EOD, truncated [ 504.322128] loop4: p7 start 1581527914 is beyond EOD, truncated [ 504.348798] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 504.366470] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:20:30 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)={[], [], 0x22}) [ 504.393154] loop4: p2 start 420544512 is beyond EOD, truncated [ 504.412569] loop4: p3 start 2114410187 is beyond EOD, truncated 12:20:31 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)={[], [], 0x2c}) [ 504.438335] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 504.459745] loop4: p6 start 3496214528 is beyond EOD, truncated [ 504.471390] bond0: Releasing backup interface bond12 [ 504.474830] loop4: p7 start 1581527914 is beyond EOD, truncated [ 504.501596] bond12 (unregistering): Released all slaves 12:20:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x24, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x1f00, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 504.600802] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 504.700575] 8021q: adding VLAN 0 to HW filter on device bond12 [ 504.718388] bond0: Enslaving bond12 as an active interface with an up link [ 504.803034] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 504.808600] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 504.854225] loop4: p2 start 420544512 is beyond EOD, truncated [ 504.877055] loop4: p3 start 2114410187 is beyond EOD, truncated [ 504.912876] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 504.940752] loop4: p6 start 3496214528 is beyond EOD, truncated [ 504.961770] loop4: p7 start 1581527914 is beyond EOD, truncated [ 505.079724] bond0: Releasing backup interface bond12 [ 505.086162] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 505.092153] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 505.109509] bond12 (unregistering): Released all slaves [ 505.116114] loop4: p2 start 420544512 is beyond EOD, truncated [ 505.141094] loop4: p3 start 2114410187 is beyond EOD, truncated [ 505.167897] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:20:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xc000000, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:20:31 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)={[], [], 0x2d}) 12:20:31 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = socket$inet_icmp(0x2, 0x2, 0x1) poll(&(0x7f0000000040)=[{r3, 0x248}, {r0, 0x200}], 0x2, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) 12:20:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x25, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 505.198836] loop4: p6 start 3496214528 is beyond EOD, truncated [ 505.244083] loop4: p7 start 1581527914 is beyond EOD, truncated 12:20:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x28, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:31 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)={[], [], 0x60}) [ 505.286279] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x2000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:31 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) sendmsg$nl_crypto(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@delrng={0x10, 0x14, 0x4, 0x70bd2a, 0x25dfdbfc, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x8810}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) [ 505.374682] 8021q: adding VLAN 0 to HW filter on device bond12 [ 505.381984] bond0: Enslaving bond12 as an active interface with an up link 12:20:32 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) setsockopt$inet6_dccp_int(r2, 0x21, 0x10, &(0x7f00000000c0)=0x8000, 0x4) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x106900c, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 505.611017] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 505.626447] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 505.658260] loop4: p2 start 420544512 is beyond EOD, truncated [ 505.670421] loop4: p3 start 2114410187 is beyond EOD, truncated [ 505.678698] bond0: Releasing backup interface bond12 [ 505.693766] bond12 (unregistering): Released all slaves [ 505.700735] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 505.748455] loop4: p6 start 3496214528 is beyond EOD, truncated [ 505.757968] loop4: p7 start 1581527914 is beyond EOD, truncated 12:20:32 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0x4, 0x1, 0x1, 0x4, 0x101, 0x18}, 0x20) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000140)={[], [{@smackfsdef={'smackfsdef'}}, {@smackfsroot={'smackfsroot', 0x3d, 'ext3\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, ':#(.\xa2'}}, {@dont_measure='dont_measure'}, {@dont_appraise='dont_appraise'}, {@pcr={'pcr', 0x3d, 0x33}}, {@smackfsroot={'smackfsroot', 0x3d, ','}}, {@euid_eq={'euid'}}]}) 12:20:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x29, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:32 executing program 5: openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPG(r3, 0x90000915, 0x0) [ 505.803888] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 505.974115] 8021q: adding VLAN 0 to HW filter on device bond12 [ 505.981132] bond0: Enslaving bond12 as an active interface with an up link [ 506.247052] bond0: Releasing backup interface bond12 [ 506.276656] bond12 (unregistering): Released all slaves 12:20:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xe000000, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:20:33 executing program 2: r0 = syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=@gettaction={0xfc, 0x32, 0x1, 0x70bd27, 0x25dfdbff, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1, 0x1}}, @action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0xc, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0x0, 0x1, 'police\x00'}}, {0x10, 0x10, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x16, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0x14, 0x15, 0x0, 0x0, @TCA_ACT_KIND={0xa8265344bea59d4e, 0x1, 'tunnel_key\x00'}}]}, @action_dump_flags, @action_dump_flags=@TCA_ROOT_FLAGS={0x0, 0x2, {0x1}}, @action_gd=@TCA_ACT_TAB={0x10}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40000}, 0x4004000) 12:20:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x2300, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x2a, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPG(0xffffffffffffffff, 0x90000915, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f00000000c0)={0x0, 0x0, [0x0, 0x1, 0x3f, 0x4, 0xd1, 0x7d3, 0x4, 0x9]}) 12:20:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x2b, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:33 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 506.577928] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 506.636401] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 506.659557] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 506.700325] loop4: p2 start 420544512 is beyond EOD, truncated [ 506.721577] loop4: p3 start 2114410187 is beyond EOD, truncated [ 506.744360] 8021q: adding VLAN 0 to HW filter on device bond12 12:20:33 executing program 5: openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nvme-fabrics\x00', 0x4d0d02, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x20) ioctl$BLKPG(r4, 0x90000915, 0x0) 12:20:33 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 506.751322] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 506.775148] bond0: Enslaving bond12 as an active interface with an up link [ 506.785355] loop4: p6 start 3496214528 is beyond EOD, truncated [ 506.817490] loop4: p7 start 1581527914 is beyond EOD, truncated 12:20:33 executing program 2: mount(&(0x7f0000000100)=ANY=[@ANYBLOB='/kev/ig0\x00'], &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) open(&(0x7f00000000c0)='./file0\x00', 0x5a95c0, 0x2) [ 506.946176] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 506.951790] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 506.976655] loop4: p2 start 420544512 is beyond EOD, truncated [ 506.999338] loop4: p3 start 2114410187 is beyond EOD, truncated [ 507.022777] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 507.038389] loop4: p6 start 3496214528 is beyond EOD, truncated 12:20:33 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="1c000050"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 507.053589] loop4: p7 start 1581527914 is beyond EOD, truncated [ 507.305884] bond0: Releasing backup interface bond12 [ 507.324197] bond12 (unregistering): Released all slaves 12:20:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x2c, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 507.395281] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 507.498110] 8021q: adding VLAN 0 to HW filter on device bond12 [ 507.535573] bond0: Enslaving bond12 as an active interface with an up link 12:20:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x10000000, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:20:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x3e65, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:34 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000040)=0x2, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000400)={'ip6gre0\x00'}) setresgid(0xee01, 0x0, r4) ioctl$BLKPG(r0, 0x90000915, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r7, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x168, 0x0, 0x2, 0x70bd29, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x743c28d8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x6c444ae}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x400}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x3}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}]}, 0x168}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) 12:20:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x2d, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 507.687360] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 507.784161] 8021q: adding VLAN 0 to HW filter on device bond13 [ 507.807375] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11362 comm=syz-executor.5 [ 507.813118] bond0: Enslaving bond13 as an active interface with an up link [ 507.892341] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 507.898137] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 507.915354] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11366 comm=syz-executor.5 [ 507.928088] loop4: p2 start 420544512 is beyond EOD, truncated [ 507.945454] loop4: p3 start 2114410187 is beyond EOD, truncated [ 507.968744] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 507.996036] loop4: p6 start 3496214528 is beyond EOD, truncated [ 508.019794] loop4: p7 start 1581527914 is beyond EOD, truncated [ 508.345078] bond0: Releasing backup interface bond13 [ 508.380918] bond13 (unregistering): Released all slaves 12:20:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x2e, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 508.476892] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x3f00, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:35 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) 12:20:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x20000000, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:20:35 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2003c2, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r0, 0xc01c64ad, &(0x7f00000000c0)={0xde, 0x7, 0x7, 0xfe, 0xfffffffb, 0x9, 0x1}) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400300) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000000408019a50fca38d020000000000000000070000041c00048008000b4000004fa008000b4000000400080001"], 0x30}, 0x1, 0x0, 0x0, 0x4050}, 0x4000800) r4 = syz_open_dev$rtc(&(0x7f0000000200)='/dev/rtc#\x00', 0x5, 0x28c380) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000240)={0x8000, 0xffffffff, 0x9, 0x8}) ioctl$BLKPG(r1, 0x90000915, 0x0) 12:20:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x2f, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 508.696102] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 508.701835] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 508.730174] loop4: p2 start 420544512 is beyond EOD, truncated [ 508.758170] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 508.770371] loop4: p3 start 2114410187 is beyond EOD, truncated [ 508.797818] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 508.838958] loop4: p6 start 3496214528 is beyond EOD, truncated [ 508.874460] loop4: p7 start 1581527914 is beyond EOD, truncated [ 508.886674] 8021q: adding VLAN 0 to HW filter on device bond14 [ 508.904221] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 508.913004] bond0: Enslaving bond14 as an active interface with an up link [ 508.924724] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:20:35 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x6240c0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) [ 508.952897] loop4: p2 start 420544512 is beyond EOD, truncated [ 508.964768] loop4: p3 start 2114410187 is beyond EOD, truncated [ 508.980898] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 508.998264] loop4: p6 start 3496214528 is beyond EOD, truncated [ 509.017446] loop4: p7 start 1581527914 is beyond EOD, truncated [ 509.200057] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 509.209637] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 509.241665] loop4: p2 start 420544512 is beyond EOD, truncated [ 509.262420] loop4: p3 start 2114410187 is beyond EOD, truncated [ 509.285657] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 509.303040] loop4: p6 start 3496214528 is beyond EOD, truncated [ 509.321924] loop4: p7 start 1581527914 is beyond EOD, truncated [ 509.367062] bond0: Releasing backup interface bond14 [ 509.375175] bond14 (unregistering): Released all slaves 12:20:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x30, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:36 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) 12:20:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x4000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 509.434635] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 509.449193] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 509.462072] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 509.471676] loop4: p2 start 420544512 is beyond EOD, truncated [ 509.488436] loop4: p3 start 2114410187 is beyond EOD, truncated [ 509.514682] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:20:36 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x634543, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) 12:20:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x31, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 509.534829] loop4: p6 start 3496214528 is beyond EOD, truncated [ 509.548895] 8021q: adding VLAN 0 to HW filter on device bond14 [ 509.559908] loop4: p7 start 1581527914 is beyond EOD, truncated [ 509.568760] bond0: Enslaving bond14 as an active interface with an up link 12:20:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x390a0000, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:20:36 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x202, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) 12:20:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x32, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 509.782357] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 509.827313] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 509.842982] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 509.869771] loop4: p2 start 420544512 is beyond EOD, truncated [ 509.891013] 8021q: adding VLAN 0 to HW filter on device bond15 [ 509.910034] bond0: Enslaving bond15 as an active interface with an up link [ 509.922442] loop4: p3 start 2114410187 is beyond EOD, truncated [ 509.945421] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 509.966367] loop4: p6 start 3496214528 is beyond EOD, truncated 12:20:36 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = syz_mount_image$befs(&(0x7f0000000040)='befs\x00', &(0x7f0000000140)='./file0\x00', 0x7f, 0x6, &(0x7f0000001480)=[{&(0x7f0000000180)="e2c515b42bb6dc973cf11bf3d7ae5556f30ebccc04074ae12abfb0b1922a98790adc389beb42d93ba53704fe68b4205a3819f94127c6b153a1c563", 0x3b, 0x100000001}, {&(0x7f00000001c0)="b91c3233ee0768f3bb38aec86b6bae8fd9451a02f9aa92719d49f66b34dfe0c67726175421e95aaf3dd70ae188035f3995c095e60e49b98d9b2a31916d24eebca0ee073c007666ed8b520e45393989368fe597dd9a8b8a09f2af3ac50f524f5c5ace4ea2d656a3dee468da1b27bfd3d9523186b93d3ecdf4dd97b031846a22f5ec3e46662bb2f6bf680df7", 0x8b, 0x7fffffff}, {&(0x7f0000000280)="ef18c939a3f2da7459bdf20494ee7b7b19bf44d75f934fee240d4c2f212925045f4ba7fdc304f939bb80b05c7567f9d9b788fd67e4f52f029ac7e41ca1a967fc8db0ca6b020b", 0x46, 0x94c}, {&(0x7f0000000300)="8bd31764bbd472719500dbeaca828f1f1f3640440240bf15747b27b23e188979107589ec02350a5e32f300c2c4d3a2ed9fd188d01c21d5506527bb02f772dda83f533a802ecc438a3c6b27026d379bd1377e519ebacd437e61fc18f3e6d4c9374b99a1112de5916f71ef6ca9fd988ce0ffd6", 0x72}, {&(0x7f0000000400)="d25d8f1982840c3e6c8809e9ffd58555c0391b7a17649066bc4c06dafe29a0777e0985e1c89101df4bb74a409b27dee7057f3f199f21d0c740cdec4ddb0bc75a9c1f2b", 0x43, 0xf85}, {&(0x7f0000000480)="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", 0x1000, 0x5}], 0x280504, &(0x7f0000001540)={[{'%'}], [{@smackfsfloor={'smackfsfloor'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@pcr={'pcr', 0x3d, 0x16}}, {@fsname={'fsname', 0x3d, '/dev/md0\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@uid_lt={'uid<'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@subj_type={'subj_type'}}]}) dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) [ 509.991698] loop4: p7 start 1581527914 is beyond EOD, truncated [ 510.193210] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 510.199387] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 510.225497] loop4: p2 start 420544512 is beyond EOD, truncated [ 510.255018] loop4: p3 start 2114410187 is beyond EOD, truncated [ 510.288098] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 510.320353] loop4: p6 start 3496214528 is beyond EOD, truncated [ 510.335065] bond0: Releasing backup interface bond15 [ 510.338277] loop4: p7 start 1581527914 is beyond EOD, truncated [ 510.350062] bond15 (unregistering): Released all slaves 12:20:36 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$SIOCPNGETOBJECT(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)=0x5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000140)=""/135) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x102, 0x0) ioctl$KVM_IRQ_LINE(r3, 0x4008ae61, &(0x7f0000000100)={0x59d, 0x8}) ioctl$BLKPG(r0, 0x90000915, 0x0) 12:20:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x41, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 510.453533] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x4800, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) [ 510.536798] 8021q: adding VLAN 0 to HW filter on device bond15 [ 510.560882] bond0: Enslaving bond15 as an active interface with an up link 12:20:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x40000000, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:20:37 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap$snddsp_control(&(0x7f0000ffc000/0x3000)=nil, 0x1000, 0xa, 0x11, r4, 0x83000000) ioctl$BLKPG(r0, 0x90000915, 0x0) 12:20:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x42, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 510.679120] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 510.692270] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 510.697893] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 510.726243] loop4: p2 start 420544512 is beyond EOD, truncated [ 510.756255] loop4: p3 start 2114410187 is beyond EOD, truncated [ 510.790758] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 510.834275] 8021q: adding VLAN 0 to HW filter on device bond16 [ 510.856216] bond0: Enslaving bond16 as an active interface with an up link [ 510.867379] loop4: p6 start 3496214528 is beyond EOD, truncated [ 510.887067] loop4: p7 start 1581527914 is beyond EOD, truncated 12:20:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x60, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 511.401198] bond0: Releasing backup interface bond16 [ 511.421836] bond16 (unregistering): Released all slaves 12:20:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x4c00, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 511.514074] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x2000, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 511.614115] 8021q: adding VLAN 0 to HW filter on device bond16 [ 511.621564] bond0: Enslaving bond16 as an active interface with an up link 12:20:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_SYNTH_INFO(r1, 0xc08c5102, &(0x7f00000000c0)={"6fb36ba00e8373b91265a29111dadae0ca3f9f648a3d3301fa8fc7ce47bf", 0x4, 0x0, 0x401, 0x2, 0x7ff, 0x2, 0x400, 0x5, [0x800, 0x330, 0x2, 0xfffffffa, 0x101, 0x6, 0x7, 0x401, 0xdb, 0x80000001, 0x1000, 0x80, 0x1, 0x3f, 0x10001, 0xffff, 0xd75, 0x100, 0xaefe]}) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r1, &(0x7f0000000240)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, 0x1410, 0x100, 0x170bd27, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x1}, @RDMA_NLDEV_ATTR_STAT_RES={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8, 0x4a, 0x1}]}, 0x48}}, 0x8041) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKPG(r2, 0x90000915, 0x0) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3, 0x42) [ 511.792576] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 511.798475] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 511.822795] loop4: p2 start 420544512 is beyond EOD, truncated [ 511.832500] loop4: p3 start 2114410187 is beyond EOD, truncated [ 511.848963] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 511.867356] loop4: p6 start 3496214528 is beyond EOD, truncated [ 511.888468] loop4: p7 start 1581527914 is beyond EOD, truncated [ 512.287232] bond0: Releasing backup interface bond16 [ 512.323893] bond16 (unregistering): Released all slaves 12:20:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0xfd12, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 512.456240] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 512.465426] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:20:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x60000000, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 512.499199] loop4: p2 start 420544512 is beyond EOD, truncated [ 512.519951] loop4: p3 start 2114410187 is beyond EOD, truncated 12:20:39 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) openat$fb0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x109000, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$NLBL_MGMT_C_LISTALL(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, 0x0, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x10}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_DOMAIN={0x6, 0x1, '[\x00'}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2b}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}]}, 0x74}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x80000, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r3, 0x4040942c, &(0x7f0000000100)={0x0, 0x3, [0x4, 0x9, 0x7, 0x9, 0x10001, 0x200]}) ioctl$BLKPG(r0, 0x90000915, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) write$binfmt_aout(r6, &(0x7f0000000400)={{0x107, 0x1f, 0x4, 0x1e7, 0xc8, 0x1, 0x1ea, 0x8000}, "24b6c8468b0ec551f58088858a9f0e0a84c5e10b3e19d4389dbcbc10ad5ebc70fdeb7b7e582424e26376b729a0a51c3e172e70e0c69bff4fd9e1a4a78a084bab81c1304ace81e39b78c296020cc4f64dc114be35805fd96e0544c1916999444877", [[], [], [], [], [], []]}, 0x681) [ 512.567601] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 512.589125] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xe, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 512.625195] loop4: p6 start 3496214528 is beyond EOD, truncated [ 512.661036] loop4: p7 start 1581527914 is beyond EOD, truncated [ 512.669005] 8021q: adding VLAN 0 to HW filter on device bond16 [ 512.708724] bond0: Enslaving bond16 as an active interface with an up link 12:20:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x5500, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:39 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xfef22104) ioctl$BLKPG(r0, 0x90000915, 0x0) [ 512.775946] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 512.792449] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 512.813469] loop4: p2 start 420544512 is beyond EOD, truncated [ 512.836594] loop4: p3 start 2114410187 is beyond EOD, truncated [ 512.858831] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 512.878877] loop4: p6 start 3496214528 is beyond EOD, truncated [ 512.894203] loop4: p7 start 1581527914 is beyond EOD, truncated 12:20:39 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x12400, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) [ 513.172495] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 513.183049] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 513.216754] loop4: p2 start 420544512 is beyond EOD, truncated [ 513.224161] loop4: p3 start 2114410187 is beyond EOD, truncated [ 513.248453] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 513.277579] loop4: p6 start 3496214528 is beyond EOD, truncated [ 513.285600] bond0: Releasing backup interface bond16 [ 513.291836] loop4: p7 start 1581527914 is beyond EOD, truncated [ 513.303797] bond16 (unregistering): Released all slaves 12:20:39 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) 12:20:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x11, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 513.379477] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x6000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 513.483276] 8021q: adding VLAN 0 to HW filter on device bond16 [ 513.505587] bond0: Enslaving bond16 as an active interface with an up link 12:20:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x65580000, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:20:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x2e, &(0x7f00000002c0)=""/108, &(0x7f0000000340)=0x6c) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSRS485(r5, 0x542f, &(0x7f0000000040)={0x2, 0x6, 0x5}) ioctl$BLKPG(r1, 0x90000915, 0x0) [ 513.813098] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 513.863342] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 513.875351] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 513.891348] 8021q: adding VLAN 0 to HW filter on device bond17 [ 513.906022] loop4: p2 start 420544512 is beyond EOD, truncated 12:20:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x408, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 513.921892] bond0: Enslaving bond17 as an active interface with an up link [ 513.940831] loop4: p3 start 2114410187 is beyond EOD, truncated [ 513.961081] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:20:40 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) [ 513.989115] loop4: p6 start 3496214528 is beyond EOD, truncated [ 514.037820] loop4: p7 start 1581527914 is beyond EOD, truncated [ 514.471294] bond0: Releasing backup interface bond17 [ 514.520703] bond17 (unregistering): Released all slaves 12:20:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x5e8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 514.607146] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:41 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x6000, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:20:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x6001, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x81000000, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 514.816542] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 514.823073] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 514.833384] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 12:20:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2000, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 514.877672] loop4: p2 start 420544512 is beyond EOD, truncated [ 514.898442] loop4: p3 start 2114410187 is beyond EOD, truncated [ 514.915091] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 514.963162] loop4: p6 start 3496214528 is beyond EOD, truncated [ 514.976157] 8021q: adding VLAN 0 to HW filter on device bond1 [ 514.984923] loop4: p7 start 1581527914 is beyond EOD, truncated [ 514.989590] bond0: Enslaving bond1 as an active interface with an up link [ 515.049816] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 515.736844] bond0: Releasing backup interface bond1 [ 515.749717] bond1 (unregistering): Released all slaves [ 515.793364] 8021q: adding VLAN 0 to HW filter on device bond18 [ 515.800785] bond0: Enslaving bond18 as an active interface with an up link [ 516.100258] bond0: Releasing backup interface bond18 [ 516.108705] bond18 (unregistering): Released all slaves 12:20:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x653e, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 516.150503] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x2, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:42 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2200, 0x0, 0x28c4422, &(0x7f00000001c0)) 12:20:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x819125c3, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 516.337495] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 516.347062] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 516.353017] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:20:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x4, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 516.379644] EXT4-fs: 17 callbacks suppressed [ 516.379702] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 516.400795] loop4: p2 start 420544512 is beyond EOD, truncated 12:20:43 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 516.427294] loop4: p3 start 2114410187 is beyond EOD, truncated [ 516.439611] 8021q: adding VLAN 0 to HW filter on device bond18 [ 516.459475] bond0: Enslaving bond18 as an active interface with an up link [ 516.467979] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 516.517484] loop4: p6 start 3496214528 is beyond EOD, truncated [ 516.543841] loop4: p7 start 1581527914 is beyond EOD, truncated [ 516.707912] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 12:20:43 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) r6 = socket(0x23, 0x5, 0x0) close(r6) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r6, 0x84, 0x10, &(0x7f0000000000)={r8}, 0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r5, 0x84, 0x78, &(0x7f0000000040)=r8, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) [ 516.761999] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 516.767788] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 516.805573] loop4: p2 start 420544512 is beyond EOD, truncated [ 516.835157] loop4: p3 start 2114410187 is beyond EOD, truncated [ 516.871743] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 516.896059] loop4: p6 start 3496214528 is beyond EOD, truncated [ 516.919087] loop4: p7 start 1581527914 is beyond EOD, truncated [ 516.968863] sctp: [Deprecated]: syz-executor.5 (pid 12580) Use of struct sctp_assoc_value in delayed_ack socket option. [ 516.968863] Use struct sctp_sack_info instead [ 517.088672] bond0: Releasing backup interface bond18 [ 517.117387] bond18 (unregistering): Released all slaves 12:20:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x6800, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:43 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x5, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:43 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 517.191241] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 517.319572] 8021q: adding VLAN 0 to HW filter on device bond18 [ 517.350658] bond0: Enslaving bond18 as an active interface with an up link [ 517.445691] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 517.456439] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 517.466516] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 517.504892] loop4: p2 start 420544512 is beyond EOD, truncated 12:20:44 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 517.550229] loop4: p3 start 2114410187 is beyond EOD, truncated [ 517.582120] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 517.603169] loop4: p6 start 3496214528 is beyond EOD, truncated [ 517.624491] loop4: p7 start 1581527914 is beyond EOD, truncated [ 517.786451] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 12:20:44 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r3}) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000240)={r1, 0xb3d, 0x100009cb, 0xb60de}) getsockopt$inet6_tcp_buf(r7, 0x6, 0xd, &(0x7f00000000c0)=""/124, &(0x7f0000000140)=0x7c) [ 517.998741] bond0: Releasing backup interface bond18 [ 518.027267] bond18 (unregistering): Released all slaves 12:20:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x11, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:44 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r3}) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000240)={r1, 0xb3d, 0x100009cb, 0xb60de}) getsockopt$inet6_tcp_buf(r7, 0x6, 0xd, &(0x7f00000000c0)=""/124, &(0x7f0000000140)=0x7c) [ 518.132013] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 518.139759] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:20:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x88a8ffff, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 518.193235] loop4: p2 start 420544512 is beyond EOD, truncated [ 518.222689] loop4: p3 start 2114410187 is beyond EOD, truncated 12:20:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x2000, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 518.258221] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 518.287949] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:44 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r3}) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000240)={r1, 0xb3d, 0x100009cb, 0xb60de}) getsockopt$inet6_tcp_buf(r7, 0x6, 0xd, &(0x7f00000000c0)=""/124, &(0x7f0000000140)=0x7c) [ 518.310062] loop4: p6 start 3496214528 is beyond EOD, truncated [ 518.342464] loop4: p7 start 1581527914 is beyond EOD, truncated 12:20:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x6c00, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) [ 518.428895] 8021q: adding VLAN 0 to HW filter on device bond18 [ 518.447865] bond0: Enslaving bond18 as an active interface with an up link 12:20:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x7fffffe, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 518.661674] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 518.667293] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:20:45 executing program 2: ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f0000000380)={0xd000, 0x10000}) r0 = syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file0\x00', 0x6, 0x0, 0x0, 0x81a010, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x248) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyprintk\x00', 0x400800, 0x0) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f00000002c0)={&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000200)=""/129, 0x81}) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000340)={{r0}, {@void, @actul_num={@val=0x2b, 0x100000001, 0x47}}}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 518.702234] loop4: p2 start 420544512 is beyond EOD, truncated [ 518.728800] loop4: p3 start 2114410187 is beyond EOD, truncated [ 518.775870] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 518.822526] loop4: p6 start 3496214528 is beyond EOD, truncated [ 518.829154] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 518.854065] loop4: p7 start 1581527914 is beyond EOD, truncated [ 518.860738] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 12:20:45 executing program 2: r0 = syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000140)) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x86e7b8fc88b6491d) [ 519.144522] bond0: Releasing backup interface bond18 12:20:45 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='highspeed\x00', 0xa) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000280)=ANY=[@ANYBLOB="4449a162aa68f871a186e414b966f05ec3b4dc520d0cb0c9e49ab94bfeda32674a4283bcf4413cfcc4b4f717c36721bf9baaf0c381151d6e481cbd300bb22d9c4f45d68ca6ac5f7a6260e5cca0114ba743ccc25c2733ffc94ffa2461c0c6c44144e4bbb8785d3a2fd0d0c32eff95afaf6a090abc751797dc6f055a9941bdc7af810eee9bb38253741b123106"]) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000000c0)) [ 519.167534] bond18 (unregistering): Released all slaves 12:20:45 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r3}) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000240)={r1, 0xb3d, 0x100009cb, 0xb60de}) 12:20:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x9effffff, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 519.268554] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 519.330572] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 519.343643] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 519.368264] EXT4-fs (sda1): Unrecognized mount option "DI¡bªhøq¡†ä¹fð^ôÜR °Éäš¹KþÚ2gJBƒ¼ôA<üÄ´÷Ãg!¿›ªðÃnH½0 ²-œOEÖŒ¦¬_zb`åÌ K§CÌÂ\'3ÿÉOú$aÀÆÄAD仸x]:/ÐÐÃ.ÿ•¯¯j [ 519.368264] ¼u—ÜoZ™A½Ç¯‚St1" or missing value [ 519.400138] loop4: p2 start 420544512 is beyond EOD, truncated [ 519.420903] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 519.424918] loop4: p3 start 2114410187 is beyond EOD, truncated [ 519.467743] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 519.475765] EXT4-fs (sda1): Unrecognized mount option "DI¡bªhøq¡†ä¹fð^ôÜR °Éäš¹KþÚ2gJBƒ¼ôA<üÄ´÷Ãg!¿›ªðÃnH½0 ²-œOEÖŒ¦¬_zb`åÌ K§CÌÂ\'3ÿÉOú$aÀÆÄAD仸x]:/ÐÐÃ.ÿ•¯¯j [ 519.475765] ¼u—ÜoZ™A½Ç¯‚St1" or missing value [ 519.506706] loop4: p6 start 3496214528 is beyond EOD, truncated [ 519.521402] loop4: p7 start 1581527914 is beyond EOD, truncated 12:20:46 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r2}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 519.568398] 8021q: adding VLAN 0 to HW filter on device bond18 [ 519.606444] bond0: Enslaving bond18 as an active interface with an up link 12:20:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x7400, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:46 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)=ANY=[@ANYBLOB='P']) [ 519.784581] EXT4-fs (sda1): Unrecognized mount option "P" or missing value [ 519.818362] EXT4-fs (sda1): Unrecognized mount option "P" or missing value [ 519.826906] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 519.836026] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 519.870153] loop4: p2 start 420544512 is beyond EOD, truncated 12:20:46 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) sendto$unix(0xffffffffffffffff, &(0x7f00000000c0)="42b9c4f26465112c1449beeb87db39874d1ab63568", 0x15, 0x20000050, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e) [ 519.900801] loop4: p3 start 2114410187 is beyond EOD, truncated [ 519.943888] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 519.958180] loop4: p6 start 3496214528 is beyond EOD, truncated [ 519.993865] loop4: p7 start 1581527914 is beyond EOD, truncated 12:20:46 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="5fd7ed31058d1047"], &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x1149008, 0x0) lremovexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=@known='system.sockprotoname\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) syz_mount_image$f2fs(&(0x7f0000000200)='f2fs\x00', &(0x7f0000000240)='./file0/file0\x00', 0x400000001, 0x6, &(0x7f0000001500)=[{&(0x7f0000000280)="68f34269c9976bf3a31a4fc8ac0b5d4336039d4bd07ff62ba14657118ac9615e1fc4f347", 0x24, 0x9}, {&(0x7f00000002c0)="e8940912b222dd61dbb31900f3ab9d4210ccb0b53bf0abad80e00a106467d4cbd2a62272c93111acdf17a234ad35c89c044cd177b8d647dd418baba14cd2d138529e087a325b5483271c119943e4b27781c94c91d518807e73007b081d5c491b5ec437b522215e66363ae31c31b686fdbfd6", 0x72}, {&(0x7f0000000340)="7e0c62494b828d859269b95d1541804caa01f9f8fcc2f915e6c84acc52ccb0f68a9c0429dc2f12557ba210074dcab12a4a6db45b511169c73aa6a4af200f4b8e8921e75b6a03fefc03562e3bb054f6eef119b8cc73a63435debb1a31b354563d5fc2e140cebe7cf29446b5f50902ac8d68a4cad3220b0880", 0x78, 0x5}, {&(0x7f00000003c0)="d9489533ed4264ad78d025745222a1d911b649ea3cfab78da085e44fe93fc88ac055167ae6c04caf8eb8107c789717dfad4a300535c6289b9014ea072d82aa6ee60ee872", 0x44, 0x1c00}, {&(0x7f0000000440)="769df75e4f7a4754cf26455365cf0fdf60b5d1b226b1c048adeebc33f7f0e2da99450db17078e359d8276fba22163bf0b47deddbf76f3e254f71558f7719d8bd4c8607d6ba651ab443d826003860b82951b4775a584ae2b3ca3375c32a29810fbfb632c1229fe6c215630a4bddc8bdc63cb691689c2635adb39cf491c7404d918387c27401fd8097f10243ab1f734518a987fa499b69a520bb3c06eb2505df804bc8404af83d98e9dda8de31d8cb8a7fdca14666d7e1223f", 0xb8, 0x80000001}, {&(0x7f0000000500)="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", 0x1000, 0x8000005f}], 0x800000, &(0x7f00000015c0)={[{@whint_mode_fs='whint_mode=fs-based'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@nodiscard='nodiscard'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@jqfmt_vfsold='jqfmt=vfsold'}, {@usrjquota={'usrjquota', 0x3d, 'ext3\x00'}}, {@inline_xattr='inline_xattr'}, {@prjjquota={'prjjquota', 0x3d, '{-]%.^\xdc\xe8'}}, {@whint_mode_user='whint_mode=user-based'}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}]}) [ 520.296973] f2fs_msg: 2 callbacks suppressed [ 520.296992] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 520.339293] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 520.375939] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 520.387039] bond0: Releasing backup interface bond18 [ 520.402889] bond18 (unregistering): Released all slaves [ 520.447679] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 520.460080] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:47 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r2}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 520.520121] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 520.528370] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 520.544854] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 520.578193] loop4: p2 start 420544512 is beyond EOD, truncated [ 520.602463] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 520.610056] loop4: p3 start 2114410187 is beyond EOD, truncated [ 520.641544] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 520.659098] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 520.668947] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock [ 520.673402] loop4: p6 start 3496214528 is beyond EOD, truncated [ 520.706684] loop4: p7 start 1581527914 is beyond EOD, truncated [ 520.790126] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 520.830885] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 12:20:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x8000000, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xc3259181, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:20:49 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r2}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:20:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x7a00, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:49 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x4) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000400)=0x101, 0x4) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x82c040}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xa8, r2, 0x2, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x1, 0x60}}}}, [@NL80211_ATTR_VHT_CAPABILITY_MASK={0x10, 0xb0, {0x1e, {0x6, 0xffff, 0x3, 0x7fff}}}, @NL80211_ATTR_FILS_KEK={0x27, 0xf2, "7e031ab74c7535458f6ba56b69c211f9eac1fd10a2babe72e2327d34094d49ccb8733f"}, @NL80211_ATTR_IE={0xc, 0x2a, [@mesh_id={0x72, 0x6}]}, @NL80211_ATTR_FILS_KEK={0x3a, 0xf2, "702d8641ff78a66280e2bde88fdc603623981454d02b90b5e873ca5f35cb4b26c02c76f43a5c9600"/54}, @NL80211_ATTR_USE_MFP={0x8}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000008}, 0xc051) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'veth0_virt_wifi\x00', {0x2, 0x0, @remote}}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f00000001c0)=ANY=[@ANYBLOB="8b"]) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x10) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r3, 0xc01864b0, &(0x7f0000000480)={0x6, 0x1233, 0x8, 0x3, 0x1f}) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$CAIFSO_LINK_SELECT(r4, 0x116, 0x7f, &(0x7f0000000380)=0x3, 0x4) 12:20:49 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000280)='j', 0x1, 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000480)='\x00', 0x1, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000001f80)={r2, r0, r1}, &(0x7f0000000100)=""/87, 0x1d, &(0x7f0000001940)={&(0x7f0000000080)={'sha1-avx\x00'}}) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f00000000c0)='ext3\x00', &(0x7f0000000140)) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000002c0)=ANY=[@ANYBLOB="00189eaec1871e223d3bf94a94b2832cf34d84e86a987ac556764c40c434554a04a445f6e0f097eaa8cd5e65955353c4b377fca08badeb8e1824454b7bf2a070c8f831e56a3f8645f74ad7afb81277905c5a2850d0ebacef43fcb690788603fc3a5d1449615ecb1b49575a808730a2862fe3cefb16eb00"/134]) [ 522.730443] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:49 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r2}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 522.807180] EXT4-fs: 2 callbacks suppressed [ 522.807192] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 522.820959] 8021q: adding VLAN 0 to HW filter on device bond18 [ 522.828370] bond0: Enslaving bond18 as an active interface with an up link [ 522.842491] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 522.848520] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 522.862362] loop4: p2 start 420544512 is beyond EOD, truncated [ 522.883850] loop4: p3 start 2114410187 is beyond EOD, truncated [ 522.910804] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:20:49 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="d449922da8d5e483"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[], [{@fsmagic={'fsmagic', 0x3d, 0x3}}, {@euid_lt={'euid<', r0}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 522.938216] loop4: p6 start 3496214528 is beyond EOD, truncated [ 522.946893] loop4: p7 start 1581527914 is beyond EOD, truncated 12:20:49 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x200080, 0x22) 12:20:49 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='./\x00\x00\x00\x00\x00\x00'], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 523.233732] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 523.299665] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 12:20:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000200)=""/20) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) r1 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x80000) connect$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x1, @fixed={[], 0x12}, 0xfffc}, 0xe) [ 523.425656] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 523.457638] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 12:20:50 executing program 2: r0 = syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) write$binfmt_aout(r2, &(0x7f00000006c0)=ANY=[@ANYRESDEC=r1, @ANYRESOCT, @ANYRESHEX=r1, @ANYRES16=r2, @ANYRES32=r0, @ANYRESHEX=r1, @ANYRESOCT=r4, @ANYRESOCT=r4, @ANYRES64=r1], 0x4) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r5 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) ioctl$TCSETAW(r5, 0x5407, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x0, 0x0, "a85f668f0c017030"}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_pts(r1, 0x141800) readv(r8, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000200)=ANY=[@ANYBLOB="006f96a5b1797cbac9225534b92e6e1822909fcf85"]) setxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="050107000000fc3d0c645ed102007c520c01b29bbd0a16277c2efcea38f48a850296d886b3767f8e5e74094848e2b361075eafe470a1d2d3f5a0a658d361cfee62b205249bdac813ca5528942261e3c5b9ba3578dd648f8bce2e635484c7fe8032130e8341b6ee9062c2e7f83b6be78b01d65537691134a5a67420d421c200000000200000000000000000"], 0x85, 0x0) [ 523.498662] bond0: Releasing backup interface bond18 [ 523.546908] bond18 (unregistering): Released all slaves [ 523.600786] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 523.689907] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 523.702843] 8021q: adding VLAN 0 to HW filter on device bond18 [ 523.716547] bond0: Enslaving bond18 as an active interface with an up link [ 523.793490] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 524.083273] bond0: Releasing backup interface bond18 [ 524.098959] bond18 (unregistering): Released all slaves 12:20:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1b0, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x8402, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:52 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r2}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:20:52 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r8 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(r8, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000400)={0x5c, 0x0, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, '/dev/rtc0\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @empty}, @NLBL_MGMT_A_DOMAIN={0xe, 0x1, '/dev/rtc0\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @loopback}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc0d0}, 0x80) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000200)={0x4, 0xa, 0x4, 0x1d020, 0x1, {r2, r3/1000+60000}, {0x2, 0x1, 0x6, 0x3, 0x40, 0x1}, 0x1, 0x4, @planes=&(0x7f0000000140)={0xeec7, 0x10001, @userptr=0x7, 0x2ae258d3}, 0x9, 0x0, r5}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x30081, 0x0) ioctl$VIDIOC_PREPARE_BUF(r5, 0xc058565d, &(0x7f0000000300)={0xfff, 0x8, 0x4, 0x400, 0x10001, {}, {0x4, 0x0, 0x8, 0x20, 0x7, 0x3, "7fcc7b04"}, 0x2, 0x3, @userptr=0x4, 0x7, 0x0, r1}) fstat(r9, &(0x7f0000000380)) 12:20:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xc3ffffff, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 525.792861] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:52 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r2}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:20:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x2d8, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 525.837202] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 525.843944] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 525.879805] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 525.881766] loop4: p2 start 420544512 is beyond EOD, truncated [ 525.929917] 8021q: adding VLAN 0 to HW filter on device bond18 [ 525.933397] loop4: p3 start 2114410187 is beyond EOD, truncated [ 525.947906] bond0: Enslaving bond18 as an active interface with an up link [ 525.987994] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 526.032191] loop4: p6 start 3496214528 is beyond EOD, truncated [ 526.052764] loop4: p7 start 1581527914 is beyond EOD, truncated [ 526.098372] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13286 comm=syz-executor.2 [ 526.430366] bond0: Releasing backup interface bond18 [ 526.438408] bond18 (unregistering): Released all slaves 12:20:53 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r2}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 526.477768] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 526.509594] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13238 comm=syz-executor.2 12:20:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xbc03, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x3c0, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 526.532795] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:53 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x400, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x78, 0x3, 0x8, 0x201, 0x0, 0x0, {0x2, 0x0, 0x5}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xf7}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x88}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x6fa7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0xbb}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_GRE_REPLIED={0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x9}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 526.629452] 8021q: adding VLAN 0 to HW filter on device bond18 [ 526.656348] bond0: Enslaving bond18 as an active interface with an up link [ 526.673381] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 526.679379] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:20:53 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r2}) r3 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:20:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x2000, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 526.720636] loop4: p2 start 420544512 is beyond EOD, truncated 12:20:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xf0ffffff, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 526.767334] loop4: p3 start 2114410187 is beyond EOD, truncated [ 526.781847] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 526.804308] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 526.821275] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 526.845337] loop4: p6 start 3496214528 is beyond EOD, truncated 12:20:53 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r2}) r3 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:20:53 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) write$binfmt_script(r0, &(0x7f00000007c0)={'#! ', './file0', [{0x20, 'ext3\x00'}, {0x20, 'ext3\x00'}, {0x20, 'ext3\x00'}], 0xa, "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"}, 0x101d) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 526.868975] loop4: p7 start 1581527914 is beyond EOD, truncated [ 526.969437] 8021q: adding VLAN 0 to HW filter on device bond19 [ 526.993048] bond0: Enslaving bond19 as an active interface with an up link 12:20:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1fffffbf, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:53 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000140)={[{@prjquota='prjquota'}, {@grpquota='grpquota'}], [{@context={'context', 0x3d, 'root'}}]}) [ 527.086107] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 527.094702] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 527.151901] loop4: p2 start 420544512 is beyond EOD, truncated [ 527.179276] loop4: p3 start 2114410187 is beyond EOD, truncated [ 527.204327] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 527.234665] loop4: p6 start 3496214528 is beyond EOD, truncated [ 527.263360] loop4: p7 start 1581527914 is beyond EOD, truncated [ 527.300984] SELinux: security_context_str_to_sid(root) failed for (dev sda1, type ext4) errno=-22 [ 527.340160] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 527.357380] SELinux: security_context_str_to_sid(root) failed for (dev sda1, type ext4) errno=-22 [ 527.364384] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:20:54 executing program 2: r0 = syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2e2f66696c653000b381d4e82315959ab70b0c9500e258ac1cd5d69ffef3a05025a9fef51cb74398b0409a84e4fb9b8463f720a3d3fe5ac2ffc3abe455fc0a3def7f4f9ae338c914c100c77b555ac99e6d83158f65c9d8de000e63d16b1155ff0e64b82e9c5f7e5c4f790de9961e06e43813f42580201047e98d12cdcd338c41e3b615dea7220bd57e15e8f87c71579d29bb52652915356c2f0023b897e86c41f3d96ad11e91bd2f7ece017e7c971d1130d58d787aa583ab2e7a51863d5a1b9f4f8eeb5702ea5a570deb84973f40ef8958dcd88016da2b27c7bbaf6f5723a1"], &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x1049008, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) syz_mount_image$cramfs(&(0x7f0000000080)='cramfs\x00', &(0x7f0000000380)='./file0/file0\x00', 0x241, 0x1, &(0x7f00000004c0)=[{&(0x7f00000003c0)="50013712ae66b870e0ed17d9c846fee368ededf8dd2c4a2ab34b054add260b830372560b434db1fa336dd32ab393b3f8cdee04d37c44185deabdc06db3556fac34a63f950562b73540ebbcd7300acb452abc594cadc848359ff6805bfb48151748b9ff2d9084e46a89a2bf2539941fe0d32f1e423c765748184d848a1a7d0ce0441f02c2b77b7d020da67ed4bcdfea42a71bd914429cf324715c9eb8dd88fe1936654e191f91dcdd9a93eecd3b684242596d35f31ec70a732f35754ca76ccda044911e5c96bf5f1a346f10232b00c2c6a8e244bdc683d0a23b5b61407ef3af670d83ec0e84f5d7db20d9da19fab71cd51c3d8cb8", 0xf4, 0x5}], 0x1100000, &(0x7f0000000640)={[{'\\:'}, {'/dev/vcs\x00'}], [{@uid_eq={'uid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/vcs\x00'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(0xffffffffffffffff, 0x7a6, &(0x7f0000000240)={0x4, 0x8, 0xc78, 0x644e, 0x7fffffff, 0x6}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000000c0)=0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000200)=0x80000001, 0x4) getpid() syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) [ 527.398453] loop4: p2 start 420544512 is beyond EOD, truncated [ 527.419277] loop4: p3 start 2114410187 is beyond EOD, truncated [ 527.466587] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 527.501054] loop4: p6 start 3496214528 is beyond EOD, truncated [ 527.530180] loop4: p7 start 1581527914 is beyond EOD, truncated [ 527.656301] bond0: Releasing backup interface bond19 [ 527.673298] bond19 (unregistering): Released all slaves [ 527.742022] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xd002, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:54 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) socket$l2tp(0x2, 0x2, 0x73) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) 12:20:54 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r2}) r3 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:20:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xfeffffff, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:20:54 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r2}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 527.942772] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 528.012672] EXT4-fs: 3 callbacks suppressed [ 528.012686] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 528.110792] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 528.116929] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 528.131365] 8021q: adding VLAN 0 to HW filter on device bond19 12:20:54 executing program 2: r0 = syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat(r0, &(0x7f0000000080)='./file0\x00', 0xa000, 0x20) r4 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x1, 0x400) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000200)={r3, 0x6, 0x5, r4}) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2e2f66696c653000bd4c0e732d9340819fabe46698ab83fb7f0ddc73f1aab9af1f0ff45737ac43d3959a83c10d2dd2ed8df287ba1972d99c8175aad44967c46700d3d463ff0e68547f2291267f40a7a5b4f694df2282725c60c821f27c9d47"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 528.155689] bond0: Enslaving bond19 as an active interface with an up link [ 528.179723] loop4: p2 start 420544512 is beyond EOD, truncated [ 528.224326] loop4: p3 start 2114410187 is beyond EOD, truncated [ 528.255715] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 528.279850] loop4: p6 start 3496214528 is beyond EOD, truncated [ 528.308555] loop4: p7 start 1581527914 is beyond EOD, truncated [ 528.337067] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 528.347311] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 528.369453] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 528.381025] loop4: p2 start 420544512 is beyond EOD, truncated [ 528.405120] loop4: p3 start 2114410187 is beyond EOD, truncated [ 528.435480] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 528.465002] loop4: p6 start 3496214528 is beyond EOD, truncated [ 528.486729] loop4: p7 start 1581527914 is beyond EOD, truncated [ 528.606697] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 528.614532] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 528.655743] loop4: p2 start 420544512 is beyond EOD, truncated [ 528.683730] loop4: p3 start 2114410187 is beyond EOD, truncated [ 528.702786] bond0: Releasing backup interface bond19 [ 528.713091] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 528.735168] bond19 (unregistering): Released all slaves [ 528.745692] loop4: p6 start 3496214528 is beyond EOD, truncated [ 528.776042] loop4: p7 start 1581527914 is beyond EOD, truncated 12:20:55 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r2}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:20:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xe001, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 528.817254] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 528.841201] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 528.948509] 8021q: adding VLAN 0 to HW filter on device bond19 [ 528.976902] bond0: Enslaving bond19 as an active interface with an up link 12:20:55 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x10, 0x3f5, 0x105, 0x70bd2d, 0x25dfdbff, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x10}, 0x4) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="5401000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="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"/313], 0x154}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)=ANY=[@ANYRES32=r2]) [ 529.092922] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 529.108381] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 529.149289] loop4: p2 start 420544512 is beyond EOD, truncated [ 529.178549] loop4: p3 start 2114410187 is beyond EOD, truncated [ 529.216103] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 529.235647] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 529.255443] loop4: p6 start 3496214528 is beyond EOD, truncated [ 529.286162] loop4: p7 start 1581527914 is beyond EOD, truncated [ 529.773922] bond0: Releasing backup interface bond19 [ 529.814899] bond19 (unregistering): Released all slaves [ 529.837502] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 529.858323] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 529.890269] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 529.904495] loop4: p2 start 420544512 is beyond EOD, truncated [ 529.914132] loop4: p3 start 2114410187 is beyond EOD, truncated [ 529.923239] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 529.955106] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 529.957210] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 529.975137] loop4: p6 start 3496214528 is beyond EOD, truncated [ 529.995231] loop4: p7 start 1581527914 is beyond EOD, truncated [ 530.128497] print_req_error: 105 callbacks suppressed [ 530.128507] print_req_error: I/O error, dev loop4, sector 127616 [ 530.144822] print_req_error: I/O error, dev loop4, sector 127603 [ 530.144928] print_req_error: I/O error, dev loop4, sector 2830 [ 530.157036] buffer_io_error: 79 callbacks suppressed [ 530.157046] Buffer I/O error on dev loop4p4, logical block 1, async page read [ 530.169581] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 530.186572] print_req_error: I/O error, dev loop4, sector 28674 [ 530.187035] print_req_error: I/O error, dev loop4, sector 127603 [ 530.198939] Buffer I/O error on dev loop4p1, logical block 63552, async page read [ 530.206899] print_req_error: I/O error, dev loop4, sector 28674 [ 530.213344] Buffer I/O error on dev loop4p8, logical block 1, async page read [ 530.224273] print_req_error: I/O error, dev loop4, sector 127605 [ 530.230723] Buffer I/O error on dev loop4p1, logical block 63553, async page read [ 530.239939] print_req_error: I/O error, dev loop4, sector 127607 [ 530.246136] Buffer I/O error on dev loop4p1, logical block 63554, async page read [ 530.254073] print_req_error: I/O error, dev loop4, sector 127609 [ 530.260302] Buffer I/O error on dev loop4p1, logical block 63555, async page read [ 530.278399] print_req_error: I/O error, dev loop4, sector 127616 [ 530.284688] Buffer I/O error on dev loop4p5, logical block 127616, async page read [ 530.293154] Buffer I/O error on dev loop4p5, logical block 127617, async page read [ 530.301305] Buffer I/O error on dev loop4p5, logical block 127618, async page read [ 530.315244] Buffer I/O error on dev loop4p5, logical block 127619, async page read 12:20:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x200003d0, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xffffa888, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:20:58 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f00000001c0)={0x814, 0x1, 0x4, 0xe000, 0x4, {}, {0x1, 0xc, 0x1, 0x0, 0x1, 0x3, "01c9b03b"}, 0xe9, 0x1, @planes=&(0x7f0000000180)={0x0, 0x6, @userptr=0x10001}, 0x1000, 0x0, r2}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:20:58 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000002c0)=ANY=[@ANYBLOB="782733376d6286bec738e4b3a255051da509861a16f3195139c93510651548c6954dfc07ecc6801ecbaf0706ed20561d3c3cc61460bf2419624f7d444f734b8c7766beaef814b6b9187fea8ac10a58110b6342bca382f74999a609cbe10a3d22fb3e4b744d2f31a3c86fe28cc55c8c8a0258059e3bed7ed1c05a70da2f53e900cc91e69a426c1c963764d627519acbbc027e1689be9447797a1e2fa8097d7dcb3207897ecce46f8adf35d8b352f60abba91d7274443d80296bb26d5846404c16df46"]) 12:20:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xf201, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) [ 531.507945] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 531.538717] EXT4-fs (sda1): Unrecognized mount option "x'37mb†¾Ç8ä³¢U¥ †óQ9É5eHÆ•MüìÆ€˯í V<<Æ`¿$bO}DOsKŒwf¾®ø¶¹êŠÁ [ 531.538717] X cB¼£‚÷I™¦ Ëá 12:20:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:58 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 531.538717] ="û>KtM/1£ÈoâŒÅ\ŒŠXž;í~ÑÀZpÚ/Sé" or missing value [ 531.613931] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 531.625505] 8021q: adding VLAN 0 to HW filter on device bond19 [ 531.637938] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 531.637994] bond0: Enslaving bond19 as an active interface with an up link [ 531.672061] loop4: p2 start 420544512 is beyond EOD, truncated [ 531.687072] EXT4-fs (sda1): Unrecognized mount option "x'37mb†¾Ç8ä³¢U¥ †óQ9É5eHÆ•MüìÆ€˯í V<<Æ`¿$bO}DOsKŒwf¾®ø¶¹êŠÁ [ 531.687072] X cB¼£‚÷I™¦ Ëá [ 531.687072] ="û>KtM/1£ÈoâŒÅ\ŒŠXž;í~ÑÀZpÚ/Sé" or missing value [ 531.701934] loop4: p3 start 2114410187 is beyond EOD, truncated [ 531.746999] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 531.774821] loop4: p6 start 3496214528 is beyond EOD, truncated 12:20:58 executing program 2: r0 = syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getuid() mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000180)=ANY=[@ANYBLOB="03fc56c2043300"]) statx(r0, &(0x7f0000001a40)='./file0\x00', 0x4000, 0x40, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$nilfs2(&(0x7f00000000c0)='nilfs2\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x9, &(0x7f0000001940)=[{&(0x7f0000000440)="b331ea2da46bc00f269152aa5c49495f24f91e6df48ce23028747298d48efaf0e6bbc77beff9d6eec6162ad6aa41f5f112723ca78d1c68786e7387f3f9b6ab5c9dd628d3b00b740fcc77a3d6e66d824ccc09a2e5a66cf99b8c3ff950b0da4b35e2975f4a74e65e296196ecb56133ceed0e47a303d82f989b3819a28ccd3a5cb0ef257e26c068208b8fb36160681e3613699a75d5becb07d70b9bd94f98649393092fe6e4d0c7b0f6c0", 0xa9}, {&(0x7f0000000500)="b546fe17ae321ac42f038e91011305de12e5bbe1d73b42f0d9b0a3c34fbdc9fe315ceb47bfeb80ee116cad4bfbf46f2b8d3d40ac65fd1c85957185f73d044ba79bdb552284694711ecdb4f0dcd59ba8c26667e11465b980fdad9a85b34696335697245466c750cf9d05e64a96252bb0704a2e2e30a0ee28dfc97b181826b365415bf9dab8ef4a19ebdb8c292a637a00a9c5e349a48f58d1d808df8613af6e86a3e", 0xa1, 0x1}, {&(0x7f00000005c0)="8c57dccaf7eceb0e57bea36a1895076a0458c4614540ec9693061e118bf8e8d244e89d3b2dace9df26d5e19e32b6bc562b9f969e39554d8aaaa8a0d5b36cc27b86e9910e17ecf6aa5d6fb48ec0cc0635c2ba135c8a9f40b1b494df3bc4a76e", 0x5f, 0x80000000}, {&(0x7f0000000640)="21ce45a281a57b9fe66c21de22937036b995f33948f16dfa0b1da90855c337d52bcf458f95e6b7e4a92ad1157414a2fdfb75e10411d157bd57d5eadbf343930c1a8a3fa05b96bc544a593f16a22277a674f0771dc5e2776684f5587e0aab56dd046a0fa1229dd77004974bdc2e6ca98c5f3564fb2b645a16defab785253b92f50ee3fa99d9fb20e239ad0e69bf6b", 0x8e, 0x40}, {&(0x7f0000000700)="37a1ed0db20aee28d397e2a495ac6902ae09e8a0252a1be60a7c4b4a869a410a7a02d9e7be522cfbb41283fff5ff510e12a8ee2a932c3f1f2586b4f14917a02a434a245641fad62c765e5ab414e57fe466516c56135ae3f5998f03dcae2a4d0cff8672945e926d369ffb297a3e65", 0x6e, 0x100000001}, {&(0x7f00000007c0)="b28a92fafddd3db9be1e2bb3a77d8e12b8ef5c7afe14c4d7a5ce5b743bdf1bbe5eacabe99b4c67a0819034418f64a87d4489e1cb3d92fad17250cbe6d8aeea60e4485319a1eed3765aeb58d8eb4129a801898b30d14f5907d3511728b8a73cd4aa883af0b1cf8ca38be8dcb1", 0x6c, 0x7fff}, {&(0x7f0000000840)="c9f947eaef8864f2f58a71e22ed163057e03210d0dbe89bbdbc279f8e2b6a4e56df8a40149104a49411b6d239246dd28100bb962d20d6e920277e523eaad5e2e55947ccf0712b45a6a2a89811173af2f8de9a1f0ccca6b80d0cbcd49bb84ba4f393ea5beabd142869038e2416baf33f8f78541df70bd2d374d0046f24c58326ef54432b710584ad4da9e7e03caa61a3b05364df78142e42c8171854bd85f73993094f90feabec252e0d3dc9c6297fc4fb18087522cb7ec8353cb1268bb1c60775b186dd5434b479e1904e82ef81dc107013968620170c2943619d1ee061699bb2293", 0xe2, 0x6}, {&(0x7f0000000180), 0x0, 0x101}, {&(0x7f0000000940)="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", 0x1000, 0x8}], 0x20000, &(0x7f0000001b80)={[{@discard='discard'}, {@barrier='barrier'}, {@norecovery='norecovery'}, {@norecovery='norecovery'}, {@nodiscard='nodiscard'}, {@norecovery='norecovery'}, {@nobarrier='nobarrier'}, {@norecovery='norecovery'}], [{@fsuuid={'fsuuid', 0x3d, {[0x64, 0x66, 0x32, 0x62, 0x30, 0x35, 0x38, 0x35], 0x2d, [0x36, 0x32, 0x35, 0x33], 0x2d, [0xaf, 0x30, 0x63], 0x2d, [0x31, 0x34, 0x31, 0x61], 0x2d, [0x61, 0x37, 0x39, 0x63, 0x64, 0x66, 0x35, 0x65]}}}, {@euid_eq={'euid', 0x3d, r1}}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_IRQCHIP(r3, 0xc208ae62, &(0x7f0000000200)) [ 531.798320] loop4: p7 start 1581527914 is beyond EOD, truncated [ 531.895179] EXT4-fs (sda1): Unrecognized mount option "üVÂ3" or missing value [ 532.209215] bond0: Releasing backup interface bond19 [ 532.233726] bond19 (unregistering): Released all slaves 12:20:58 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKPG(r0, 0x90000915, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 532.294157] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:20:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xf403, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x2, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 532.404883] EXT4-fs (sda1): Unrecognized mount option "üVÂ3" or missing value [ 532.414199] bond19 (unregistering): Released all slaves 12:20:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xfffff000, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 532.510460] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 532.518803] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:20:59 executing program 5: openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:20:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000280)=ANY=[@ANYBLOB="004e7cb5e1de06518484dd86226a84c9d91ae247360585d87f5baf294b982a3234abc485c30eaf29c6e473257222b95d83b5e3f334d0cc652fd98da880ddfecb2fee99c1b04e83aedae887b694b9123ab59fb29e0b319b72ebda37d481fce7b8c557c0bb9afee1d46f38e6014b4a5deec43759e79225646355f3fad6a38f3e6d51a491dc7fd2fe5508efdc00"/151]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000340)={0x0, ""/256, 0x0, 0x0}) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000007c0)={0x80000000, [{r2, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r1, 0x0}, {0x0, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r1}, {r2, r3}, {r2, r3}, {r1, r3}, {0x0, r3}, {r1, r3}, {r2}, {r2, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r1}, {r2, r3}, {0x0, r3}, {r1, r3}, {r2, r3}, {r2}, {r1, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {0x0, r3}, {0x0, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {0x0, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r1}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r2}, {r2, r3}, {0x0, r3}, {r1, r3}, {r1, r3}, {r1}, {r1, r3}, {r2, r3}, {r2, r3}, {}, {r1, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r1}, {r2, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {r1}, {r1, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {r2}, {r1, r3}, {0x0, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {0x0, r3}, {r1, r3}, {0x0, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {0x0, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r2}, {r1}, {0x0, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {0x0, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r2}, {r2}, {r2, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {}, {r1, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {0x0, r3}, {r2}, {r2, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r1}, {r2}, {r1, r3}, {r1}, {r2}, {r1, r3}, {r2, r3}, {r2, r3}, {}, {r1}, {r1, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2}, {r1, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {r1}, {r1, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r2}, {r1, r3}, {r1}, {r2, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r2, r3}, {0x0, r3}, {r1, r3}, {r2}, {r2, r3}, {r2, r3}, {r1, r3}, {r1, r3}, {r1, r3}, {r2, r3}, {r1, r3}, {r2, r3}, {r2, r3}, {r2, r3}], 0xff, "3072b707efa5fc"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f00000017c0)={r5, r2, "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", "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"}) 12:20:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x3, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 532.558919] loop4: p2 start 420544512 is beyond EOD, truncated [ 532.580227] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 532.587655] loop4: p3 start 2114410187 is beyond EOD, truncated [ 532.621803] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 532.668786] loop4: p6 start 3496214528 is beyond EOD, truncated [ 532.694914] loop4: p7 start 1581527914 is beyond EOD, truncated [ 532.706820] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 532.708229] 8021q: adding VLAN 0 to HW filter on device bond19 12:20:59 executing program 5: openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 532.725567] bond0: Enslaving bond19 as an active interface with an up link [ 532.850884] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 532.857890] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 532.886721] loop4: p2 start 420544512 is beyond EOD, truncated [ 532.914172] loop4: p3 start 2114410187 is beyond EOD, truncated [ 532.943146] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 532.965553] loop4: p6 start 3496214528 is beyond EOD, truncated [ 532.984367] loop4: p7 start 1581527914 is beyond EOD, truncated [ 533.009161] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 533.023293] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 533.045916] loop4: p2 start 420544512 is beyond EOD, truncated [ 533.064381] loop4: p3 start 2114410187 is beyond EOD, truncated [ 533.087256] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 533.109056] loop4: p6 start 3496214528 is beyond EOD, truncated [ 533.127643] loop4: p7 start 1581527914 is beyond EOD, truncated [ 533.181748] bond0: Releasing backup interface bond19 [ 533.203068] bond19 (unregistering): Released all slaves 12:20:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x4, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:20:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xf803, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:20:59 executing program 5: openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 533.306804] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 533.318894] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 533.477619] 8021q: adding VLAN 0 to HW filter on device bond19 [ 533.492954] bond0: Enslaving bond19 as an active interface with an up link [ 533.507460] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 12:21:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xffffff7f, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000200)=""/250, 0xfa}, {&(0x7f0000000300)=""/243, 0xf3}, {&(0x7f0000000400)=""/136, 0x88}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x4, 0x0, 0x0, 0x8000}, 0x8848) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 533.529637] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 533.546527] loop4: p2 start 420544512 is beyond EOD, truncated [ 533.554016] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:00 executing program 5: openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xa, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 533.612926] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 533.650328] loop4: p6 start 3496214528 is beyond EOD, truncated [ 533.656429] loop4: p7 start 1581527914 is beyond EOD, truncated [ 533.666420] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 533.688111] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 12:21:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000000c0)=ANY=[@ANYBLOB="d65803fea1095640"]) 12:21:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xff0f, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:00 executing program 5: openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 533.825232] 8021q: adding VLAN 0 to HW filter on device bond20 [ 533.853555] bond0: Enslaving bond20 as an active interface with an up link 12:21:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 533.900330] EXT4-fs (sda1): Unrecognized mount option "ÖXþ¡ V@" or missing value [ 533.923396] EXT4-fs (sda1): Unrecognized mount option "ÖXþ¡ V@" or missing value [ 534.012642] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 534.039503] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 534.045044] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:00 executing program 2: r0 = syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) statx(r0, &(0x7f00000000c0)='./file0/file0\x00', 0x100, 0x40, &(0x7f0000000200)) [ 534.088846] loop4: p2 start 420544512 is beyond EOD, truncated [ 534.122674] loop4: p3 start 2114410187 is beyond EOD, truncated [ 534.151493] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 534.167746] loop4: p6 start 3496214528 is beyond EOD, truncated [ 534.188968] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:00 executing program 2: socket$inet(0x2, 0x800, 0x2) r0 = syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='./fdle0\x00'], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000300)=ANY=[@ANYBLOB="79493aba666b170f7a1ce2e20028332210232a73e4a8f01ea2a45a4e475f8000991b14f100bf39cb2775423299db2b1ec89334fc4f649fe6410f0ac670a90324669ea8ac5087ac08a4a4d73f922890c2b529660ea3aa6a8ce742f574f0c54a9b26a023d9819ab8e451aa7a259ab0279bfcde0f7f0ebf39f44b8fa6e21cf209d8ca4d2e5c4030c22ece3e732d00233849970f494a2918b6"]) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000600)=[{&(0x7f00000003c0)=""/162, 0xa2}, {&(0x7f0000000480)=""/127, 0x7f}, {&(0x7f0000000500)=""/236, 0xec}, {&(0x7f00000001c0)=""/56, 0x38}], 0x4, &(0x7f0000000640)=""/186, 0xba}, 0x102) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000280)={{0x3c, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x2, 'wrr\x00', 0x1, 0xc, 0x7e}, {@multicast1, 0x4e21, 0x2, 0x80, 0xebf7, 0x4}}, 0x44) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f00000000c0)=0x1) modify_ldt$read_default(0x2, &(0x7f0000000200)=""/68, 0x44) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x40, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x7a}}}}, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xd}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x9}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x40c0) syz_init_net_socket$x25(0x9, 0x5, 0x0) [ 534.378834] bond0: Releasing backup interface bond20 [ 534.411023] bond20 (unregistering): Released all slaves 12:21:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x5c, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:01 executing program 2: r0 = syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0xa, &(0x7f00000005c0)=[{&(0x7f0000000200)="5f529d27ed8681d99b760b0bd34e0a5fc70cfa02b30f7cc08267c6c786f0da3e2d693c4de03e7a0d2d9a0cb0bf904ed5e24e60e55e8d6321e4375c0d06b00bc00039b211cc3ba2a6c06322b80748d8a05835ef41e882d34112fdecf48d79fde65dba50d5444db1dc535259cb484da59750611b2ae928846b067f44403cd177ed23f6bf1c7c4fa1b5dc07e6f0f74c56000580d9a768bca5e80f4fd3f182fc4392fa87b59afaa6feef801578a621edb7eb601ab92d3de6e203cf1ae5f470c0dcd3d53adab7f1afc8ef20b8debfa68702686e62", 0xd2, 0x4}, {&(0x7f00000007c0)="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", 0x1000, 0x5}, {&(0x7f0000000180)="0e", 0x1, 0x100000001}, {&(0x7f0000000300)="9564f1459b408a1963aeba674be34408525fba9748b12e467875f4fdd7223d931beb86d1dd69d7dd1f75b62eab1ae0e1c86d5d029bdc571793d1821b07afd8c75273e0311a3f34e71908dcbdae369ff4a5663647bba7638654c3cf86c1333e4528651744041311bbf0d9e0500c51b33b28548c424321f6c528ca4cd7008df289ba8e1a9a301dfae5262a522cf1e0372496bb42fa9bd2784ae3b6cf5b53fd70ab88d3091ad833d61c28d4df96584c247be752b13c47", 0xb5}, {&(0x7f00000003c0)="2cb13f02419b18beb528af4dd708f80c3e23dd5bb903125f3b639a96197ce40c1428b6c348baa4f19ac9b4d9bfdf128b6d252601f8d153a2", 0x38, 0x5}, {&(0x7f0000000400)="5d1a78ea17142953d810dd334a67eecb9998363ca8494d03ba05f10992ffd1cb21", 0x21, 0x1}, {&(0x7f0000000440)="21e17df011101440e50b0897b288d9d48b9b97019cb1500bc368c13bec19725ac59c9a58bd098cc1d0b72fd8c9aa6ad332c31e37556598759f27d50883fee4de208051599943", 0x46, 0x8000}, {&(0x7f00000004c0)="0dc7196456b3e9e9716e4fc553e76d341869d532e65074df296448608200b40ac27c610d52c0e97d875016697288fa7cb30e38e7a14e3644b9d984c4196843c017a4cff2407d6b95172e0ed68b61567087d0a88412d57feeba6781caeb6ee5129bb4fe2b", 0x64, 0x1}, {&(0x7f0000000540)="2a16a1b5d65950d7b2145df0bab20ea3e59bf2adb4b4130e5f860fe2dce50ab8af852b5f71d8b667", 0x28, 0x6300}, {&(0x7f0000000580)="aeabfa83a953620ffaf728eabc094efe2e176b241d4db4e48c781d36732adf86301bf5d5660a062c8fc97c9a545ec24fb1", 0x31, 0x8}], 0x2000, &(0x7f00000017c0)={[], [{@fowner_lt={'fowner<'}}, {@uid_eq={'uid', 0x3d, r2}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}]}) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 534.532072] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 534.583698] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 534.606684] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 534.637123] 8021q: adding VLAN 0 to HW filter on device bond20 [ 534.648472] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xffffff9e, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:01 executing program 5: openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) ioctl$VIDIOC_G_PRIORITY(0xffffffffffffffff, 0x80045643, 0x2) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000200)={0x8, &(0x7f0000000340)=[{0x0, 0x0, 0x0, @multicast}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 534.652246] bond0: Enslaving bond20 as an active interface with an up link [ 534.672413] loop4: p3 start 2114410187 is beyond EOD, truncated [ 534.744101] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 534.761134] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 534.778381] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 12:21:01 executing program 5: openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x102, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 534.793364] loop4: p6 start 3496214528 is beyond EOD, truncated [ 534.832494] loop4: p7 start 1581527914 is beyond EOD, truncated [ 534.841793] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 12:21:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x1f319, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0xf, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl(r0, 0x7fff, &(0x7f0000000200)="e58f16bdeb953aa9ac0b8436561d706de0eeb4da5e575d62759499c53669ae76dd4f322b2559f2dd9d03f41bc684fc1189ae2e02c82e9240a2876e479b0c018b0da38c83bcf99e951a364656c0a7541e422f10dca7b207c01a6fbb8aa98b8c70d584100475331028f1cf062c196cc971906ea0f4693f546a0e32a4e83fe1ab02bcc32908c557ffbb0a9dd359404bd84b31d81bebfbf70ec9ea52e247c549cce832f8d0847550ba929cd74bd435795ccb51d2b534792f46c5faa858e170c7c6735e32d10f26c8") mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00']) [ 534.914421] 8021q: adding VLAN 0 to HW filter on device bond21 [ 534.937929] bond0: Enslaving bond21 as an active interface with an up link [ 535.008740] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 535.045345] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 12:21:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x20000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000200)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, @in6={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xff}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e20, 0x1, @loopback, 0x4}, @in={0x2, 0x4e24, @private=0xa010102}, @in6={0xa, 0x4e22, 0x9, @private2, 0x3ff}], 0x84) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e20, 0xffffffff, @loopback, 0x9ee}], 0x3c) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 535.131359] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 535.138532] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 535.170508] loop4: p2 start 420544512 is beyond EOD, truncated [ 535.204957] loop4: p3 start 2114410187 is beyond EOD, truncated [ 535.225909] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 535.227311] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 535.254322] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], &(0x7f0000000200)=[0x0], 0x3, 0x3, 0x1, 0x1}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000280)=ANY=[@ANYBLOB="8afd1d06cff6cdd000000080"]) [ 535.279154] loop4: p7 start 1581527914 is beyond EOD, truncated [ 535.433423] bond0: Releasing backup interface bond21 [ 535.482375] bond21 (unregistering): Released all slaves 12:21:02 executing program 5: openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:02 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2e2f666b6c6530004c8724aaa27bf1fca644b319c4eeeccd39768f22491678b4ca082a80456fee3b9d3316c2d339c49de31c76d3b751ff4f88f90df82d1a66ede520c6ea4988b12a996cfba29a2f2bd75f4f8055729a3f57209ea6b571b075ec14bd5695e7af268e2c070b46416bdd979ae1e3c6a8b3f73bc1bd24cd0876f9004766a1427765a2f25f3157c6884529181dafc162ada4b65bfb03b766d22967a246e8"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x4000, 0x0) ioctl$TCGETX(r3, 0x5432, &(0x7f0000000180)) bind$tipc(r2, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x0, 0x79}}, 0x10) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000002c0)={'HL\x00'}, &(0x7f0000000300)=0x1e) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 535.558969] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x1f321, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 535.701970] 8021q: adding VLAN 0 to HW filter on device bond21 12:21:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xffffffc3, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x118, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:02 executing program 5: openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 535.751151] bond0: Enslaving bond21 as an active interface with an up link 12:21:02 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000002c0)=ANY=[@ANYBLOB="c8e305accbf76d018cdf94d6d48783facb1728d4b9fca1621820a4614d5b7ff26c1618c26a3135b2fe98efc7f1977c8f5308a9147e2423ea3671a5090d753cd0d96b5c46cb5af929e6a9159dba3407ea575bf8bcfb16593bcd7e9f5374eeed9353c119c84e52681c2d1f25f2dc02ddd3a75fd310ab36621cdfaf6ef819bb3615f4597d22515b849e4b2b31f0cdb40ca959489cb09addc296b1db1b7da5eeba9ba1e01dea9eb595474e48ee86366ef1c72045467966d066880ac179f6102d77f1953d0de678c6e1b376d433da6b4f413290648185c1d6093e6e95edb7309ece229d9fe984155c97ae78015c15c75c"]) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x10002, 0x1, 0x6000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) [ 535.838767] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 535.864322] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 535.896079] loop4: p2 start 420544512 is beyond EOD, truncated [ 535.905728] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 535.922370] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:02 executing program 5: openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x2a00, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:02 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 535.953543] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x1b0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 536.003887] loop4: p6 start 3496214528 is beyond EOD, truncated [ 536.030827] 8021q: adding VLAN 0 to HW filter on device bond22 [ 536.038305] bond0: Enslaving bond22 as an active interface with an up link [ 536.043254] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:02 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2e2fc7825916cf3b86a31fa986160d88300000"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) r0 = gettid() ptrace$getregs(0x2, r0, 0x8000, &(0x7f0000000200)=""/243) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) faccessat(r4, &(0x7f00000000c0)='./file0\x00', 0x112) [ 536.487292] bond0: Releasing backup interface bond22 [ 536.503035] bond22 (unregistering): Released all slaves 12:21:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x20000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x1e0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:03 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2e2f66696c653000df2c675251f97b46444d06ca663adbcae8627d80872866fd9626ab5f577b12f8360c2fdaa9cd9dc6a310676db903ef92105fa590135b905bcd8dc46c0394905b6ba3c3052d39cec7abe5a240cb28b46add9187"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 536.607232] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 536.733254] 8021q: adding VLAN 0 to HW filter on device bond22 [ 536.762028] bond0: Enslaving bond22 as an active interface with an up link [ 536.779976] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 536.795444] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 536.828583] loop4: p2 start 420544512 is beyond EOD, truncated [ 536.855255] loop4: p3 start 2114410187 is beyond EOD, truncated [ 536.897786] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 536.941824] loop4: p6 start 3496214528 is beyond EOD, truncated [ 536.967056] loop4: p7 start 1581527914 is beyond EOD, truncated [ 537.303586] bond0: Releasing backup interface bond22 [ 537.315696] bond22 (unregistering): Released all slaves 12:21:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xfffffff0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:03 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00'}, 0x10) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="2e4b0017ce6c54fbef2804f65b575ecde25b0000000000"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x54, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'ib', 0x3a, 'tunl0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14}}}]}]}, 0x54}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x9ec5223c483820b8}, 0xc, &(0x7f0000000200)={&(0x7f00000007c0)={0x10dc, r1, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x40, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2831}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xcf68}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffbff}]}, @TIPC_NLA_NODE={0x1010, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x1004, 0x3, "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"}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x100}]}]}, 0x10dc}, 0x1, 0x0, 0x0, 0x4}, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000140)=0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_ASSOCIATE(r0, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x38, r3, 0x4, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_DISABLE_HT={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac}, @NL80211_ATTR_PREV_BSSID={0xa, 0x4f, @from_mac=@device_b}]}, 0x38}, 0x1, 0x0, 0x0, 0x4004c44}, 0x10) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') 12:21:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x1f2, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210e4, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) [ 537.483998] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 537.525112] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 537.533832] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x201, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 537.581482] loop4: p2 start 420544512 is beyond EOD, truncated [ 537.590868] 8021q: adding VLAN 0 to HW filter on device bond22 [ 537.610779] bond0: Enslaving bond22 as an active interface with an up link [ 537.614476] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:04 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 537.665241] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:04 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="635050ae20b17abdea61e8fcc3d5125c8b5cc1e2432160dead49b00b5fbff10fc54553aa6108f5c6b90fba387e89eb12c95479c65d92eefa5a1b475f038f0e90f9ca2b34cfb7d63a319ab202fce190ec51c572a08966ccbcfc18f8336f1dd9e2edbf63d2719f0dd86d2adc90d9bc1c4b785bda896d986d1a97d699f834d1bc72a922a3b3c01036281102ffab1ed84a950465d10c550098c71052b29962653b3c4f86781fcd1ee97f0098a72ce034f67afc7cb6e1bd20c3d29bc9932f23b3d477f5134801ac29dd", 0xc7}, {&(0x7f0000000140)="4b76e76507bd921fa656dd89af9072977ffd4f4e68b9a66d5d965faaa29a7833f77a757d0cb1746c29f9d4bd1e2a957f5ab958126cf450aa12dde459126ee86dc7fb7a2c506db90b9ef081274e4ca7f77dd5bed74cb160ac7df312a92bc7bd2054dd0a2e67f45ecb", 0x68}], 0x2, 0x3f, 0x800) [ 537.713785] loop4: p6 start 3496214528 is beyond EOD, truncated [ 537.733210] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:04 executing program 2: r0 = accept(0xffffffffffffffff, &(0x7f0000000140)=@rc, &(0x7f00000000c0)=0x80) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x802000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x54, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x67}}}}, [@NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0x5}, @NL80211_ATTR_COALESCE_RULE_DELAY={0x8, 0x1, 0x4746f18f}, @NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, @NL80211_PKTPAT_MASK={0x12, 0x1, "fb5a1908ef09f9d078809d5196b6"}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x48004}, 0x34040881) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) 12:21:04 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000002c0)='port1\x00', 0x0) keyctl$get_keyring_id(0x0, r0, 0x10000) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x8cc422, &(0x7f00000001c0)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000200)={{0x7f, 0xff}, 'port1\x00', 0x93, 0x4, 0x40, 0x81b8, 0x6, 0x80, 0x5, 0x0, 0x6, 0x40}) 12:21:04 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000140)={0x52, 0x5, 0xa13, {0x21c, 0x4}, {0xff, 0x667}, @period={0x5d, 0xae, 0xd04f, 0xfff7, 0x20, {0x6, 0x1, 0x80, 0x278a}, 0x1, &(0x7f00000000c0)=[0x40]}}) 12:21:04 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) mount(&(0x7f00000002c0)=@filename='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='ocfs2\x00', 0x43000, &(0x7f0000000380)='^,&,.\x8f%$/r\xdb.}*\'\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) syz_mount_image$gfs2(&(0x7f00000000c0)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="a1369b39de176566b1dfb22452422341ec55da7b23b550fa683e5710d6c72fc0", 0x20, 0x10000000000}, {&(0x7f00000007c0)="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", 0x1000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6e6f646973636172642c646f6e745f6170707261c173652c6f626a5f757365723d2c682173682c657569643e", @ANYRESDEC, @ANYBLOB=',audit,\x00']) [ 538.284276] bond0: Releasing backup interface bond22 [ 538.315493] bond22 (unregistering): Released all slaves [ 538.366861] EXT4-fs: 16 callbacks suppressed [ 538.366872] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 538.398059] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 538.426402] gfs2: invalid mount option: dont_appraÁse [ 538.474027] gfs2: can't parse mount arguments [ 538.502125] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 538.516637] 8021q: adding VLAN 0 to HW filter on device bond22 [ 538.533981] bond0: Enslaving bond22 as an active interface with an up link [ 538.559525] gfs2: invalid mount option: dont_appraÁse [ 538.567115] gfs2: can't parse mount arguments [ 538.890008] bond0: Releasing backup interface bond22 [ 538.897529] bond22 (unregistering): Released all slaves 12:21:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xfffffffe, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:05 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210e5, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x218, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:05 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x224, 0x15, 0x400, 0x70bd28, 0x25dfdbff, {0x5, 0x28}, [@INET_DIAG_REQ_BYTECODE={0x13, 0x1, "eb0b905888eda90a75cff883f0e54a"}, @INET_DIAG_REQ_BYTECODE={0xf5, 0x1, "39e58708832d3c77e9b0ebcab50001f7ba85f5adebe6d77f28e184f5421995ee2300b709918c60f6a66ffce96974038f83ccc109288d6d5ca8c907697ad93f50d8450cdca1ccf849fa8a728c14b14e1fd2b012eff66d15b4b4b7c796bd376bd14febb0c15d47eb2042df2d49666cc4d54e5d4939b258efe913919662aa6d5167391bca8a1f354759c610293299098bad23d2e8ab608ce340059673113fb86bffec518025765bfcb61f6ada737d9121ebbfdf174e2bc4289fc438ec803ee9c4f8d9b97d6b515c7ab7152768e128e2ba9aa58bc8a4e86f11fad4be4df8a4545962524d9f6f9e22364e84456e2300a6e108e7"}, @INET_DIAG_REQ_BYTECODE={0x101, 0x1, "0b9b4e2209ad7dcb39c9e53510ab89509c54bdd0f361e2bea5371155b6c25e6800080ed379221ed9705204ae4e92e6f7e01c67e6900b52fd3d494648580ed91c9ae2ce7df502ee6c27c3727318b3b0b70d45feeca52a1f6f1f63c2ec697d2625b8cff8489c93f921ad9e66ba8f17a5a733662ffc6e2c7bf2417cec696249fb83cd94cbe715ec6efe8708eb57e5a9775d1afb98ce18fe0b8da2dc823e612a5e9689883a276e46afa71a0b7e7857967abdb89d993f3fbeb0b1fcd88c94f286252bec80fc9c60918691c0c36ad62ad624d76e27971fb99e119ddf39de56cc39ed0ebac155dc6956b7d101c95e46c5080f8ab9eacdc272441975305e11b9d7"}]}, 0x224}, 0x1, 0x0, 0x0, 0x45}, 0x4001) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) 12:21:05 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 539.044076] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 539.053580] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 539.090256] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 539.099441] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 539.105076] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:05 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) read$FUSE(0xffffffffffffffff, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$fuse(&(0x7f00000000c0)='fuse\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4010, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xb4}}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1200}}, {@max_read={'max_read', 0x3d, 0x4}}, {@max_read={'max_read', 0x3d, 0x10001}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@seclabel='seclabel'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}, {@pcr={'pcr', 0x3d, 0x3b}}, {@audit='audit'}, {@audit='audit'}, {@smackfstransmute={'smackfstransmute', 0x3d, '&[*,'}}, {@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}]}}) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00']) [ 539.150539] loop4: p2 start 420544512 is beyond EOD, truncated [ 539.174847] 8021q: adding VLAN 0 to HW filter on device bond22 [ 539.179856] loop4: p3 start 2114410187 is beyond EOD, truncated [ 539.191800] bond0: Enslaving bond22 as an active interface with an up link [ 539.223354] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 539.230386] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 539.266962] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x284, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 539.312705] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:05 executing program 2: r0 = syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file1\x00', 0x0, 0x1049008, 0x0) r1 = syz_mount_image$bfs(&(0x7f0000000140)='bfs\x00', &(0x7f0000000180)='./file1\x00', 0xf0, 0x4, &(0x7f0000000480)=[{&(0x7f00000001c0)="13bcb3f88e7e4cbd082b7eab1306d3f76e9adf0a7e761a2a39d5789301849d8a5a285329d2d84094f0cc10cce5e87bc66979362b3cdb15d839bdf96fe26d81f6ee056ea41e2b3438cdfb670551953f4005df93cb61d3f55a28ad25f1840647ba5ba18dcdffbaa61e3b34e51c760643e0e1e2a78c6dcf4237fb7b319286ffb45d8a8c03d40a44d4f8b985b73ff517c1f4c7e1a8302a241905d0a92b68615dbf28d452dc0653db77895b97593540426ce186ad86146cdf94a16cd35d79696bfeec52eb98edbc3fd939b4c33371cbdd64ca75f24d", 0xd3, 0x4}, {&(0x7f00000002c0)="f8d4b4935559396493d4980ace0ff259ce251afc70734c099f210fa4ec2a8e9c9db3ddacf1ee17d0bc555ebba35b9e3c9327000b84b4aa3d92d8d0fca6e4dcc1ca8f49f33fb14d3bd4cc1939386f07a22b2f64034efbd01f3163b48bc30e5763102a4116468c80404ca46ad3dca4fb18e6cffad669ef7e226b4d2ca247df788f4a74ff8f866fceb4e352d064a4e9a9d9f50fe88397cb2514626b39d55c7a8bb3c06c44efd04d79eae8341eff9bdc30c57b962c7b67c33bc2ac236df4eec6b1420b13b650e790dc0af2dfd1c77cd3c9df6e8c790a62aaf3", 0xd7}, {&(0x7f00000003c0)="4d5a33ef261c7500f52c2375393cf47fc7ac5b1fe47fad32e24cd942e0e67b69ee054c236f4d312ebef66565d4e7c40c8617c9", 0x33, 0x3e7}, {&(0x7f0000000400)="291dc9d62e7863f395c78ee2bbce4b508114515b8c13c635dd947a3d090a2e9bcc8852a2a109e982df2a905833c058e6bcfc64dea6e8ba081fee431ac33d5513ef0423f67d150d9459d7000478711db244da21ed5a8fc043a39824c3b0731bc7cad5b8a79d87319044aa7cac311bf9cc7860500bf63b5e7ad386f509", 0x7c, 0xfffffffffffffff7}], 0x1000a0, &(0x7f0000000500)={[{'ext3\x00'}, {'ext3\x00'}, {'ext3\x00'}, {'!%#'}, {'ext3\x00'}, {']*^[^&@{{'}, {'\xef:[:*%%[-#\'%![)'}, {'ext3\x00'}, {'\\}g\x89)*-)+!:'}], [{@smackfsroot={'smackfsroot', 0x3d, 'ext3\x00'}}]}) linkat(r1, &(0x7f0000000580)='./file1\x00', r0, &(0x7f00000005c0)='./file0\x00', 0x1000) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="66736e616d653d65787433802c00"]) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) r5 = socket(0x23, 0x5, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r5, 0x84, 0x10, &(0x7f0000000000)={r7}, 0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000600)=@sack_info={r7, 0x2}, &(0x7f0000000640)=0xc) [ 539.597586] sctp: [Deprecated]: syz-executor.2 (pid 14981) Use of struct sctp_assoc_value in delayed_ack socket option. [ 539.597586] Use struct sctp_sack_info instead [ 539.653156] bond0: Releasing backup interface bond22 [ 539.664640] bond22 (unregistering): Released all slaves 12:21:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210e6, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 539.717100] EXT4-fs (sda1): Unrecognized mount option "ext3" or missing value [ 539.739133] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x2d0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 539.783228] sctp: [Deprecated]: syz-executor.2 (pid 15020) Use of struct sctp_assoc_value in delayed_ack socket option. [ 539.783228] Use struct sctp_sack_info instead 12:21:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0xffffffff, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 539.879686] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 539.885302] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 539.929271] loop4: p2 start 420544512 is beyond EOD, truncated [ 539.949192] loop4: p3 start 2114410187 is beyond EOD, truncated [ 539.968267] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:06 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCAX25ADDUID(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={0x3, @default, 0xffffffffffffffff}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000700)='/dev/zero\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000740)='syz0\x00', 0x1ff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000021c0)={'wg1\x00'}) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0)='ethtool\x00') accept4$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14, 0xc00) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xe8, r2, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x24000000}, 0x1) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f00000006c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f0000000780)={0x60, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0xffffffff, 0x73}}}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x6}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x6}, @NL80211_ATTR_MESH_CONFIG={0x24, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_PLINK_TIMEOUT={0x8, 0x1c, 0x400}, @NL80211_MESHCONF_HWMP_PERR_MIN_INTERVAL={0x6, 0x12, 0x6942}, @NL80211_MESHCONF_HWMP_MAX_PREQ_RETRIES={0x5, 0x8, 0xfe}, @NL80211_MESHCONF_MAX_RETRIES={0x5, 0x5, 0x9}]}, @NL80211_ATTR_HIDDEN_SSID={0xa, 0x7e, @default_ibss_ssid}]}, 0x60}, 0x1, 0x0, 0x0, 0x51}, 0xc0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000002c0)={'ip6tnl0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x29, 0x4, 0x2, 0x3f, 0x1, @private0={0xfc, 0x0, [], 0x1}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xf880, 0x8, 0x10000, 0x4}}) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000380)={'ip6_vti0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x2f, 0x7, 0x3, 0x4, 0xb, @empty, @remote, 0x700, 0x80, 0x5, 0x6}}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0xa0, r2, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40810) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 539.993307] loop4: p6 start 3496214528 is beyond EOD, truncated [ 540.002583] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 540.014526] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x2d8, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 540.125415] 8021q: adding VLAN 0 to HW filter on device bond23 [ 540.144131] bond0: Enslaving bond23 as an active interface with an up link 12:21:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210e7, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:06 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x10cb028, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='\x00', 0x8, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00']) setxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:hugetlbfs_t:s0\x00', 0x21, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x4, &(0x7f0000000180)={[{@xino_off='xino=off'}], [{@obj_user={'obj_user', 0x3d, '\'.:}'}}]}) [ 540.321664] overlayfs: unrecognized mount option "obj_user='.:}" or missing value [ 540.352980] overlayfs: unrecognized mount option "obj_user='.:}" or missing value [ 540.379379] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 540.385084] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:07 executing program 2: ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 540.422818] loop4: p2 start 420544512 is beyond EOD, truncated [ 540.443920] loop4: p3 start 2114410187 is beyond EOD, truncated [ 540.464793] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 540.477366] loop4: p6 start 3496214528 is beyond EOD, truncated [ 540.491616] loop4: p7 start 1581527914 is beyond EOD, truncated [ 540.502325] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 540.518286] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 540.525120] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 540.537485] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 540.550827] loop4: p2 start 420544512 is beyond EOD, truncated [ 540.566950] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:07 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000140)=0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 540.582266] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 540.607695] loop4: p6 start 3496214528 is beyond EOD, truncated [ 540.617822] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:07 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000380)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1009089, 0x0) syz_mount_image$erofs(&(0x7f00000000c0)='erofs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x1, &(0x7f0000000180)=[{&(0x7f0000000200)="f16ecda058366d7e1f0f7f11e2baaf1a701c0224b766e3d53cd109f36074e92359e2a3e2af09bd4ca810f18615f13a982459923a3bfd9edf609b23300a2085df11ceb2e054e02d7d07d2dd96d553ef221f0998f236814c11c12ac3b2918724c8fb345fa61ed1c2066857c5dd8f588a1958a3ea0a0a0c2eed97c0f8515d123002c6b37a25c075ab1b2a536eff1f433c912e447cee41a87339d054ebaade1d706d4932d3c40c12ed27e2b0cfa90b81cc5e", 0xb0, 0x4}], 0x15a1822, &(0x7f00000002c0)={[{@noacl='noacl'}, {@fault_injection={'fault_injection', 0x3d, 0x7}}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x2}}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@dont_appraise='dont_appraise'}]}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 540.643653] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 540.657011] bond0: Releasing backup interface bond23 [ 540.666276] bond23 (unregistering): Released all slaves 12:21:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 540.742108] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 540.772387] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 540.787952] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 540.824673] loop4: p2 start 420544512 is beyond EOD, truncated [ 540.834153] loop4: p3 start 2114410187 is beyond EOD, truncated [ 540.836928] SELinux: security_context_str_to_sid(system_u) failed for (dev sda1, type ext4) errno=-22 [ 540.852384] 8021q: adding VLAN 0 to HW filter on device bond23 [ 540.860250] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 540.861675] bond0: Enslaving bond23 as an active interface with an up link [ 540.894557] loop4: p6 start 3496214528 is beyond EOD, truncated [ 540.913896] loop4: p7 start 1581527914 is beyond EOD, truncated [ 540.921091] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 540.942309] SELinux: security_context_str_to_sid(system_u) failed for (dev sda1, type ext4) errno=-22 [ 541.167898] bond0: Releasing backup interface bond23 [ 541.198321] bond23 (unregistering): Released all slaves 12:21:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x2, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x300, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210e8, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) 12:21:07 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 541.369644] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 541.376556] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 541.380028] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 541.405758] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f00000000c0)) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2845402, &(0x7f00000001c0)) [ 541.429896] loop4: p3 start 2114410187 is beyond EOD, truncated [ 541.494620] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 541.520748] loop4: p6 start 3496214528 is beyond EOD, truncated [ 541.536108] 8021q: adding VLAN 0 to HW filter on device bond23 12:21:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 541.540227] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x3bc, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 541.590206] bond0: Enslaving bond23 as an active interface with an up link 12:21:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 541.666425] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 541.679401] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 541.685368] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 541.731273] loop4: p2 start 420544512 is beyond EOD, truncated [ 541.737996] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x3, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 541.778152] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:08 executing program 2: r0 = socket(0x11, 0x800, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) recvmmsg(r0, &(0x7f0000004080)=[{{&(0x7f0000000480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000500)=""/59, 0x3b}, {&(0x7f0000000240)=""/121, 0x79}, {&(0x7f0000000840)=""/208, 0xd0}, {&(0x7f0000000740)=""/48, 0x30}, {&(0x7f0000000940)=""/166, 0xa6}, {&(0x7f00000007c0)=""/41, 0x29}], 0x6}}, {{&(0x7f0000000a80)=@ipx, 0x80, &(0x7f0000001b00)=[{&(0x7f0000000b00)=""/4096, 0x1000}], 0x1, &(0x7f0000001b40)=""/48, 0x30}}, {{&(0x7f0000001b80)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/202, 0xca}, {&(0x7f0000003d00)=""/142, 0x8e}, {&(0x7f0000003dc0)=""/123, 0x7b}, {&(0x7f0000003e40)=""/176, 0xb0}], 0x6, &(0x7f0000003f80)=""/226, 0xe2}, 0x1}], 0x3, 0x2, 0x0) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x810}, 0x4000) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) 12:21:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x3f4, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 541.819480] loop4: p6 start 3496214528 is beyond EOD, truncated [ 541.825572] loop4: p7 start 1581527914 is beyond EOD, truncated [ 541.852589] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210e9, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 541.914637] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15401 comm=syz-executor.2 [ 542.042293] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15401 comm=syz-executor.2 [ 542.056176] 8021q: adding VLAN 0 to HW filter on device bond24 [ 542.079935] bond0: Enslaving bond24 as an active interface with an up link 12:21:08 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 542.133884] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 542.153927] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 542.177405] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:08 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x4aeaeea7, 0x0, 0x0, 0x1000006, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2e2f153e418e122d"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000400)=ANY=[@ANYBLOB="41db085f496d23f2311770de2f9ce8100c544dd0286d9b76136fd48ee4167c9180850978be62a2b71b9a70f2cb00410e80036eead8ee2c24418eede92511c354390020724c78d78bd809237ffa953a4d5c3bf1e275c0c6c9d143e02c2307749e793cc26f91"]) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0xffffffffffffff57) r2 = socket(0x10, 0x3, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-monitor\x00', 0x40000, 0x0) ioctl$sock_ax25_SIOCDELRT(r3, 0x890c, &(0x7f00000005c0)={@default, @default, 0x5, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) sendto$inet6(r0, &(0x7f0000000480)="c83dd28af8cc500c18e34e5255841125d633bd30f953803594fbc12098d8a71190fcda52b24d584b81ece2d0bb2f6097122bfccdde28313b5259b478ceca69f358bcbbb5d0686a5b9a28eb2a632f46df5d72cfd2c72876827fe0809efbf6b46232b458e5208eacc13cbe319f4d45c18557e74866cb07bd15", 0x78, 0x80, &(0x7f0000000500)={0xa, 0x4e22, 0x7fffffff, @mcast2, 0x20}, 0x1c) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x80000001}]}, 0x2c}}, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000002c0)) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nvme-fabrics\x00', 0x101000, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r4, 0x541c, &(0x7f0000000380)={0xd, 0x90000000}) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x2, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r5, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x90, 0x0, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7b}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x90}, 0x1, 0x0, 0x0, 0x20040050}, 0x4000011) dup(r5) 12:21:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x3f8, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 542.210730] loop4: p2 start 420544512 is beyond EOD, truncated [ 542.241274] loop4: p3 start 2114410187 is beyond EOD, truncated [ 542.264068] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 542.286337] loop4: p6 start 3496214528 is beyond EOD, truncated [ 542.313059] loop4: p7 start 1581527914 is beyond EOD, truncated [ 542.340689] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 542.351113] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 542.372705] loop4: p2 start 420544512 is beyond EOD, truncated [ 542.387049] loop4: p3 start 2114410187 is beyond EOD, truncated [ 542.403792] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 542.420799] loop4: p6 start 3496214528 is beyond EOD, truncated [ 542.435818] loop4: p7 start 1581527914 is beyond EOD, truncated [ 542.538940] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 542.547458] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:09 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000000c0)=ANY=[@ANYBLOB="54ce066800"]) 12:21:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x4, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 542.584537] loop4: p2 start 420544512 is beyond EOD, truncated [ 542.614881] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xa00, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 542.657171] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 542.693169] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:09 executing program 2: setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e22, 0x7, @empty, 0x6}}, 0x0, 0x0, 0x2f, 0x0, "ab09978bf6f17f5b80fdb83ff396627247cb82eb5d59c773f0a0142e53ff76d174c18a4a6682bacd66d586692c41146eeee90ddccb0bd16855de5a248295fab66c594054356f5e8ec61e830fd56716a0"}, 0xd8) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$invalidate(0x15, r0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="3b2f66d0a1906900"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$can_raw(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@canfd={{0x2, 0x0, 0x0, 0x1}, 0x3f, 0x0, 0x0, 0x0, "4bd34dd60d2eb9210ec240dc88003a5aa985a5d322b56c3daa18303b3238d68ad46bdff7e937822212caf609607cfd51c686bc2fd30020cba35a24e284e41fb5"}, 0x48}}, 0x10000000) [ 542.709132] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 542.730364] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x1801, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 542.791249] 8021q: adding VLAN 0 to HW filter on device bond25 [ 542.803996] bond0: Enslaving bond25 as an active interface with an up link [ 542.822984] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 12:21:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210ea, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) 12:21:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 542.830569] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 542.850953] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 542.871524] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x5, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:09 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 542.901303] loop4: p3 start 2114410187 is beyond EOD, truncated [ 542.933168] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 542.952040] loop4: p6 start 3496214528 is beyond EOD, truncated [ 542.981130] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 542.991566] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x1802, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:09 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x28100a4, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 543.059633] 8021q: adding VLAN 0 to HW filter on device bond26 [ 543.067130] bond0: Enslaving bond26 as an active interface with an up link 12:21:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x0, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 543.127967] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 543.137931] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 543.150213] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x6, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 543.187566] loop4: p2 start 420544512 is beyond EOD, truncated [ 543.221194] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:09 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, 0x0, 0x20e5433, &(0x7f0000000140)={[], [{@uid_lt={'uid<'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'ext3\x00'}}]}) 12:21:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x2000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 543.247955] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 543.273170] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 543.290484] loop4: p6 start 3496214528 is beyond EOD, truncated [ 543.318188] loop4: p7 start 1581527914 is beyond EOD, truncated [ 543.399044] 8021q: adding VLAN 0 to HW filter on device bond27 [ 543.407691] bond0: Enslaving bond27 as an active interface with an up link 12:21:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 543.444601] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 543.462354] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 543.481384] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 543.507263] loop4: p2 start 420544512 is beyond EOD, truncated [ 543.529263] loop4: p3 start 2114410187 is beyond EOD, truncated [ 543.554354] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 543.598042] loop4: p6 start 3496214528 is beyond EOD, truncated [ 543.607656] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210eb, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x7, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:10 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f00000006c0)={0x0, 0x3938700}, &(0x7f0000000700)) syz_mount_image$afs(&(0x7f00000000c0)='afs\x00', &(0x7f0000000140)='./file0\x00', 0x9, 0x7, &(0x7f0000000500)=[{&(0x7f0000000180)="0ebcec6131efba8fb7342c8b92aab4bcaca18061d9fd144fd41b6cf5b2", 0x1d, 0x80000000}, {&(0x7f0000000200)="afc0738cb1cee0dc705888053018b8f082acda8534ed956cd4f1d1b4bbfc1829e2a576abecdf7b251f0e4a529c3010a76487b456eec8094f4fff42bc70bec1d36080ecf316d0b5088066c155af7593434d1ec83cc7ea1e1486a45a7374b557a0af9d51f51e0ffc687f29d5a702d92e322658fc6934900d0794445dbe45578f1a93487a716f192765c2feaa9c00b3a6111879d02f30eda59835e24b6e0b572a45221538277ac8e3", 0xa7}, {&(0x7f00000007c0)="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", 0x1000, 0x2}, {&(0x7f00000002c0)="0effad2fa22a2b0c725276b3d50517ddc1a96ca80b9a21df866ed94dd66f38068b2730211eb519f1b4f08e45b0b5a4e9da326a5e04f4342d5097c1ae658b861d245de478a8f21cf13f5eed296989ede763200267b63e2c5c1ca4a7755906c6e824f0cd3528d2a696750fdabcc8d6986d85ffcdc0be0473bf0036f3936fec8a85091f29d4848f1175bde8d4afe1999f86cf06882ff5ba8d08a153b5b9c4ade05edba9547ce4924169e57aa8ade62929b44faf24193b66", 0xb6, 0x200}, {&(0x7f00000027c0)="f4c7b92ada355d6f70c0465ab2884e6bc3656d9648915a3d8e5009627b1acbc55b2d3a837cf52a75c8b5ee537b5d96c9fda11ff92f46d91f060411959d2926161f67619d5c526116595880366e591b02c8f2efecec721ff0873e87a5aa071b5dc3e9e3442f450266565b7175075cf4484f139df4ce825290961a3aa745901efec675df864bc25e4adf69ca6102884291cc093210fd6a624494321ae70c30194c85a7b35607daac82d3fbbab345fde5b4c78b936ffa3900ef0e598b5e92400e53e30b43b763395458941a287c2697e7fe8c6de6e3eab5adf994e533e11aa3367d9077fddfb317a147ef7ab45a68ae0c924989bccfdaee32a8b529216e54dfd1428e389d7e252af2bb86b15945a267ee47a6f927b8a519947b49dc6c01c4757b7fbe0be220cb6ce832cc59e0db3c9d1ee0bcdb3c0a06b012be556b421800e35d8248e9c1e54d80c1317d1f447daef1fc4c0c766e5c93f3dd45691ac726c1fe82ce5f1ad49cc9a9f5739ebe515f96fbf0fe8e87a6fd81918a42595889c6821372c25bd306b1af56b12164755ae9d3675a0e8d31017d3b2b17c131a081517904caf99fccb662b227956eb6e7a8cdbc1248f60e2e135b62a2fb8c0942d5088ab436ec40eebcb48eb053f1a3fee8d00e48e4f82d1576a2bb586e82a92cdbd7e2b21d0423ea525e8cdcd19e38f2d25d4ba3911ee1b0796495f243fd6393222ab46e75f4b63a56f2f7ac95c81dc403de372a783fc78d065e3d2a9db1bbbca5edb48ef17350c523fc3c352b093931b11be25d15024fc593121585faf1d41f0f9a9fea7e7cbc6530b9ef98f17ba3d014f0ff290c12d1f70ddb20b3ee3e557156ca9c7576f113c6a14991f1634d06af7579ae0f6a4533ccb01d2e23e683c3a720cd7962c14c2bc80a22f3ac0652f747ac052419dd70637bcd36f88976b825760bf713fa7d7976efcf5dd09c41701ab2d7f0ab940692eb8fb8a3d5d2181dac3e8c53d5d7700be0f17243a0650852e87ab7dd657efd85ffdee38a36e040e90cdda62e612c46aa6d0c9cc2641aa34deb738dde5f2444ea0e55fa4fc8ee2066d152dadf8e65ef17c59407813f427417f91d47682899233d8049a9512cf79ba322a922961e457e5b4a0b456a98918232cce338cc859c8c7ee136a90db1ea2ebfef6c13cbbf18dba5794da44729b7cce96c897a7748ab7cc70679340aa72140a6a4c53e68cfd06b9b4b6f763205136e74f0afb6f9318bbc1dea3b7e4763256cad2973b039ef298f285116ec7b891756b2dda4825d6a97427d2868d310d2066a5cbe3a60ace9829c255925611ab7babaf4d769f4b9e90f468af0e44b6251ade2aa8be1d898ef2e6366acc02c814dca45b6dbfe9d224ec6d6fe9386eff4d42aa762aa71413af1d7415959059093e1e801a55f67c77a95bb3bd4dc6f8ad8ed7cdcd5ee6dc506e32a1de3b6c4b7ad775e5dd74d7a2096f2d65cfd45d9ef6a233ace7d59cf26d21d5e85632c3cfd380180e83ea10a7931de023eac71c1ad00c206142c5fa8bb1b7ea2a1af68339535ea828967b2c2c95f6e5137bc56f3b23a396db52f7c8fb32ee5bda032015c6c2bb73dea5e6ba8a37693470f332852cdb35ca3c52a31969d6b8723ff0ce30d37bb7d8e2fa5deda8f9297042cdeede428020083082ad2ec3e2247e913ffe35821c3a9c4810e2dd22a5fd6f5946d1c670081cda5f810652e33912e5f015a50912edc54b5fbe959005b86a7597496335ddd5aa5334e095efccb1684101301c79ea9e3a0db7d9faa57776554ce48a4d4273b881c58a0271c6a5fdb741335b1c3abcd5b752fecf687c55d709beabd08726e688c7f907b0a15dacdf66e62e23cefb81d90cf2c8cb6f811ad8b501ae484410fc73418426af51c4838db5d25adacb90e83121b6654009fec861a3fc28caf0463835d240ae95ab98ca158c45e68fc505e74f17cae84ae4dc4f7dcc709fa217babae992252e00c078e3ec1bc11a35a3f6ebc6545dfd6910e6962220713a2e0438c1be8a5ab4d1e12f2a54eab72aaa52c912c52b9cd6d75b44c6487cec4b11a791763c9e5e96b25d36c3bfa2f4291e0dc929a05953c19e9c01c27651cea7ceb95cfd99101c062245c09394bb03681c5ad20d86771fce62caee15936adc78e3b699aae7ce90b383cd90a0460e7f0f4a2c93541f242d74c7890112348eabb9e26960e0e1e0858da77d85f5e4d9fff5069c89ff0b557c5475608b2fd1cbc446175c3dfadf2bb778e37283a4c9f6291733d8ad1a3a81d1ae8c95de4c2ce9699f9891b43e6718ef73b436d65f36a455ca64374bc10fbbb82e137d4da22942e205caed640c8982c4b2cde7e7396153b4d6c275d79e3af190b91821781bf1dc4fabe151bec6f7f6c590b3539c984e1c4a8c30a14d8c2056b2e12ffe1dc5114a0e22f0198decc66bf6efce904687a49456ff6b276e5431a06cf48d7ce76e2ce413f76ba32aa45f6a95a674a7f5d87af881bf75ff9cd8a561f316641ffeb9cd150dc156faad622d9ea7a27b918ec03a020c1c771948b5d57406b19650e0469da567c5e1109cab70f973be8b1a6c3a252a7eb15eeb8c4eb62d30341337834e505a6139584c7a6f996e9a5cfa553d4c8822ccf4628136dc34ece3916398fa0a0a06eab364865c55ac000bd410533bcbf37e1cc4abd34e89e5ca07beec209cbd68f54026519b2dc49908b378cf611a2d091f7105d4b66f3d198c5b80225ef2bfee72f1fd1ae3624aefcf28301aeca4f5c1d4271a677239ffe8ae5c059ab21c0e4c4a45157c76e9836e7105589cc8b8234167308df7f600dcf4814431d4aaefc4442534090725e257f666de6dc4f650c389ee0e599b528ee108bd67fec75b4e2808fc22bfc3bec15b630026d507933a53a4844fb824101d628dca658f0db057d73d165d1db4189f8544341ac90ecd149fe981de85c3ba3a4d04c4cb124a9cece29be3d24d7abbe9156ed2236289d3db17f963b27d942a4a00d6b92d0d27d86ac0b754aba0bb0c2c2e9ad590675f04393018890624d007da6b89c984d35d2165704aaf37ff2e1cc4307a7b47af3c6216718758ea56c2eb8a391a155d38e95a80fbe8cd55886212b14e58d0f54f02a5f3cca6178a35d5b80dacdcb17da4c5e928d1df3b63cfbc2ba0a108d822004c610142a29204b95cc847e93f169f18d5ea6ae176336cfb6b5c029a5fc9341219cbd44117f8fc067edec42d49871fe69f4d02529fd999efab4a1976d7de4e1b4253f39c4453785351013ae1a225e156c315585bada2b73fd1b1fcd3ce84ba341f54380c6b8405b845227cc135b1289835f63b31840d793a28ee5e99a79a7b3fca307557db1d93484d17948e7751e89772789da83d07350978318c779f8e5b989ea6a8a4d2b36112c9f3b201a2a18726c84f5ac6e5804ef7357ca34b650d881fedc96b8a9ac96086eaba6b7a5dbabf5ae6bfb076cbe89242933d4b2397a462578e1697091eb5c1b80998eee62b4c6268d7fcaffdc380cafebc221db9ace8858df801a52c5ffbf01f930aa5966b00870e20d91e6a47f2c856447a8cd0e1f29f5e89f0076400e73941b1da991c16ab5956611c8bb2b419f606e9d129a3ec71c73ac34442c426c6e3f151d54a021533e3d8dd5e624fd68978f4da4a849962a78e8e1f8b48a9b2de30bf25d28ef15512c69edf0f288c21af8d0cee277a6338042efd9e96b9c52f8257148ca7df67471f89329b18587e43fdcd67070e63078e9e26e02aacdc323c7cbf692985a41a32050d6958e67dd5bb2fc1252b59890635bd6a95f3dcdf3458b40612a17fb9a800302fc2accaabf77e7d06db42c3cfca5c811d393eb1d7b9da8e66267cdd3e11dcc4a19a2ff8d75e6dba568cb435c779cbbba3b17d012cc876d9b5aaf6869d978331bbe2bf6d81ffcb87fb2e3c573b2001b2afc370474a95c322498b31dea396e64f2b78a91aebe031567f9b547318f1ed1bea5c0c64d931ca4e5fcbcef78e06656a169d13fc2621ff9a86901d028642ea37342049dea114d1eb42c5bd2223c3bff1c054688a7cbedd2fd99c1b286ceeba9924e05aa34030751da60beba244c3fa57fabe3a90e9599eb971f26ea61eb735952acb969eb49cc1cc512e6831f0052d7fe4fa0582f879e4e3ac812b2659629efc492cbd80e2e969c0e80647982abeb76e55a08c2f1e6331d1ee2f00f00961328b7fe9f31222771511b553f2e752472c35189fb1dc6a04b11f97de57f944dd90385d4040c89dba11cedd208076476a2b42e27bf0c7d81248c5c0eb17a9d202950b41a9ac1ae81cb93c1ed5d897d188dab10d967330be168e5564dcc88cf24b4b58a6b98f4023fa96031e89344359343e4f74b258bc62acc2953d1bfddca13afeeaf81eaec928761dffba199ac298e143714564f95848f907aa41874039f315b64f505a446ffe7da616618b76b444839a03ff95fcd665f45a7b248fdd15563135b182ce027d65102072bad3c7a8b833eb196df829f8de9b264ac13b78fcdb52bcabfe04854e2cbb5815a2d263ba17ae85658b282bd60d1498f6ddc63db20b52b2e66be43745f44de598e66ad6d0675070cbbe1b025b807674e278cc6255eee0e54325333c8e1e96717078b1540c1386e29d91a626ceae58d9e2f3f88a097c8d1795e8d658d00c20c64ed8725ad151e232b4cdee7448025689c01761a998522e09f7fa4c584aea9894e47bd1aa069edf0ffce2d6a266ae81a4fc8fd2cefbbd24ffe200e1c38574d986783033a28b74246caadda77c20b8e40e091de670d5e2aa93f334c5ac43fe0c1b41357365f3d0e964d1c7f97520503fd425a1c5fe8fa6219f74600bfad6083042ba36e3876b1bbb9b5c4ea6ba28af64baa712c7d64deb927b2f39a7d6db0db07669007e5dacb09b548cf0668ef1fd09db21a1be0ad098d247ba45d5db6c1682223ef2c9788285f5aaada4a68520af82f7678b5510e5879ce5ab8744a9b6f85232c610d0fe526b1c60da4d2ac63507f38a2e0193d7ad6eb2733bba4f3719a81829b1e93b90a4b833fb7d36650567333e02a46dd9726442946da2aec10096bf17684f140a490bef8e632287ac18b25faba82cb2d3dafee42f076d3d23af4010b050722d00590655e877d25e01b99b97bdaf576357ed748e092fbe5479b2643d62201ceef68e525ecd6ba189a7f65a5a7c51802dfe00683f2c421b9b4749991af632e2aee60957c3e4711436b8b85d82cac57fc624c028961aa6837aed6fd29ebd6464c0bd9a7f3f3f03b08433001fc4155ab7f040b850b266daa4e744c68d7fa3103cad28624f5422e6474042bc316060fd56bedfeeceb3bba73d6ba723fa40c005a23b52fdc92972a653a3b14d88422e9cf40189cdd9b517b86edec278e2e050092d00655dff5bf4180e53d615342e311ef78826fdac077b1a57517dbaf9b528c6f91f34b9d9c4c3502bbda12c811d3409d10b765037fcc4d19865c43a2758d11c20ee16dffe85d6cc991363e24d98fa93447aa719c5937d7e50b8a6e1b5cc5e0c77c9ce393f56b0cdfd9cc8b1c4bac732378e889ee07068b555fdd1f2d0e2ef50dd61c8049f373f2934e23dbde82acfe2c2c56dd1c67cc3d682060a3e3d37093305b368b0345d02b5743ae71e18c6acc6825b41837d29d332488620770e2bdf56803b6634993a2748929e5c6516bd43c8c202abb81870e3a756433b18b471a31b343a464b0a7a5f17f5d425cfc35efb77287a11a0e96b9491e00b7a8c5b38b897ad725f268e6509a4b8c56dc475eccb81baeb0b35e6d1a3ae5dd42f423bc6507001c0f0a97", 0x1000, 0x3}, {&(0x7f0000000380)="e6a8cac90524e302a3166ba6ee770675824e3400a1ab209d8bb445d9f1eb32c09422ae2ff2dc4b5c44ea0f90286e84a8d9a65b2bc8c801b5bc2099eeab4c5be1e24f3cf027a513c327bc3c4637cbe9d6f70ec23164631d7847e6ed38b3d020694428c9b1c13b13cc6e8c", 0x6a, 0x2}, {&(0x7f0000000400)="ea88b321fd31e7437aee4962493bf95c5fad660a65d90dd3e4d8cb109eded5b4b8ae6c9a578e993e24a8574cbe07c7ad17a7d6f748e3bce73b58c32d3e9e7f5700ce03677a80bf38bfce207ee1f0b88ab7f3722d158fa7ed11510e282e334086e80b36037d60480d0286f5516131b9a4060937087fe2abfe8e54fae8bfd8beb4418fcf82ed35d5a9a19c7eaee908050b29cb3a73ee1afbf5d3f38ef846621c0ef2a825ecba54bf953b41d0e1298bdefaa4380440b948fd38dd2fcbc7de13c1ee9a2240fff8312b51042c8f7565d0d8ebbdb74ba34a37db7533d23f64c2", 0xdd, 0x1ff}], 0x1038000, &(0x7f00000005c0)={[{@flock_local='flock=local'}, {@autocell='autocell'}, {@dyn='dyn'}, {@dyn='dyn'}, {@flock_write='flock=write'}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@dont_appraise='dont_appraise'}]}) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, &(0x7f0000000080)={0x0, 0x101, 0x0, {0xfffff000, 0xcc5, 0x401, 0xe2}}) mmap$xdp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3, 0x10, 0xffffffffffffffff, 0x100000000) r0 = getpid() process_vm_readv(r0, &(0x7f0000000740)=[{&(0x7f00000017c0)=""/127, 0x7f}, {&(0x7f0000001840)=""/151, 0x97}, {&(0x7f0000001900)=""/252, 0xfc}], 0x3, &(0x7f0000001e00)=[{&(0x7f0000001a00)}, {&(0x7f0000001a40)=""/176, 0xb0}, {&(0x7f0000001b00)=""/166, 0xa6}, {&(0x7f0000001bc0)=""/102, 0x66}, {&(0x7f0000001c40)=""/105, 0x69}, {&(0x7f0000001cc0)=""/63, 0x3f}, {&(0x7f0000001d00)=""/130, 0x82}, {&(0x7f0000001dc0)=""/34, 0x22}], 0x8, 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="07000000612beb1251197d0104fffb30be58d1e43740de84d38cfb4b24cd64a193ecbe3ca851d79f15cdf0b4745bb796981aab35ab7db569a19b61fc723bbee32c3ea103dd"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001e80)={'ip_vti0\x00', &(0x7f0000001a00)=ANY=[@ANYBLOB="73797a746e6c310000000000f2000000", @ANYRES32=0x0, @ANYBLOB="0008800000000006000000084809002000650000b6009078e00000017f000001890b7fac1414aaffffffff01"]}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000001ec0)={@mcast1, @mcast2, @loopback, 0x7, 0x0, 0x200, 0x500, 0x6, 0x8, r2}) 12:21:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x3f00, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 543.672340] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 543.679468] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 543.693217] loop4: p2 start 420544512 is beyond EOD, truncated [ 543.715893] loop4: p3 start 2114410187 is beyond EOD, truncated [ 543.730803] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 543.742274] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 543.752161] loop4: p6 start 3496214528 is beyond EOD, truncated [ 543.775683] loop4: p7 start 1581527914 is beyond EOD, truncated [ 543.807691] 8021q: adding VLAN 0 to HW filter on device bond28 [ 543.826804] bond0: Enslaving bond28 as an active interface with an up link 12:21:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x0, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x4000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 543.988973] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 543.994803] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 544.014881] loop4: p2 start 420544512 is beyond EOD, truncated [ 544.030205] loop4: p3 start 2114410187 is beyond EOD, truncated [ 544.046182] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 544.069115] loop4: p6 start 3496214528 is beyond EOD, truncated [ 544.093366] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x8, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x5c00, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 544.568845] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 544.574382] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 544.600973] loop4: p2 start 420544512 is beyond EOD, truncated [ 544.612715] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 544.629380] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 544.645487] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:11 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$pvfs2(&(0x7f00000000c0)='pvfs2\x00', &(0x7f0000000140)='./file1\x00', 0x401, 0x8, &(0x7f0000000600)=[{&(0x7f0000000200)="be91c82763349340d94e754121d2874b44694e52c0c538ecf91db6a21de1dd05f6b82599fe4ebff032ffee24220a5277f1aa4fddbc87deac918f4121200745034b71cf577ae3f8ed4ec19ecae555c7fbb9197c4e9dafeefab309c66792325d8372e2579daa66c2557fce8b3f4a1387ba430dafc33abf8f5ae6a04e5f2dc0e1a58fe006be7c7c1cc45e7bd2fdce27ea96ef8c5a7a1ac0b2ba8a", 0x99, 0x6}, {&(0x7f00000002c0)="2a3499416454ebd80e21314ac51770be81a672db8f0624f215180e2e16c2654d42df7354d69d9b8feffa8bae5e809bc04845c01028ffb9cfdf811927cfb6fb5a4949f1c3234379a8365eeca225e50b7a8043711664", 0x55, 0x3}, {&(0x7f00000006c0)="f9b92e160027e8ef29f3a9e87ccb06e1e24589b8522ba57bef73b8de261918110847c5031d8a0d1632d605d4a7239893560e5dd5aca3bd5b66a19f856e53d47b69a4a9b51be4238df2b5f9daae000000000000468db64cdac8fdbd4f612b3991058b556742e9e3449e301b55", 0x6c, 0x6}, {&(0x7f00000003c0)="3b5106d88d604243e0ad90a49ac0a5d23371ea8af2c2595a46e5dbd115b657e6f4cc19f7950ab563988b10441307cfa158b968daea96a9b2b510cdc9975bafa4784320a5137cf012b3ab5da202b966675733df57da48ef7df057a151e1365d91904ea635af39e36c3fbc5b7aa02c37140d2693a9cdb4d2b84cedde5161d2f1f2bb029ab1d5", 0x85, 0x80}, {&(0x7f0000000180)="877745c8f9c540e8c7157871edce815c65bf956ee89f97db310b63b9b6eba486f79312daee28", 0x26, 0x10000080000001}, {&(0x7f0000000480)="2b1e668364f22e97e50e8ab034e881ddd0020002b967308f3476baa3ed46608a447f7335eb9e5abf7fb9156540f963eba6b9df56dc703465800d966368eecbe12b79369b8bec12cf59be14ae222fcf15a19248b9cf92e02702a1631567f9d50de81266986b5ee4a8a964763c23ebd1893a4f5534b4bd4cf7842ed76eea0301ee62e48b293666f9692cb8c9ba", 0x8c, 0x9}, {&(0x7f0000000540)="8871306e67b146d5677ba716bb7f070316452e9360a0b082b04edb133439d308f853a326043b782e80", 0x29, 0x1}, {&(0x7f0000000580)="d39d8079491b1400792e926e3267916d6fd7c7f82ca73ad043beba7f3e66a1a137f78383673912f39a4bc717021a9ec9138146f6c0c926f622d47737911662879a36cc034042d055caee6b9ff4ff7ff4031ef4e12923946c0b4cf431c79de12b00bb8846b1a95b46709f4890a97b07a3b7", 0x71, 0x9}], 0x80008, &(0x7f00000009c0)={[], [{@seclabel='seclabel'}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@dont_hash='dont_hash'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@smackfshat={'smackfshat', 0x3d, 'ext3\x00'}}, {@subj_role={'subj_role', 0x3d, ']xt3@'}}, {@audit='audit'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}]}) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="ae2e66696c653000"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000880)={'filter\x00', 0x4}, 0x68) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000007c0)=ANY=[@ANYBLOB="020e3a9d119f4f2cb0eab78598b15b5fff9ef1cef89e9a50425f8d5a237c3b0e9a5616682ea4964aba0f83fe9ce5acca06b3f8e8d5683c8a6bd3d11948889c0b56668a211c8e004110206a23b71c3c3fa8e43d02aa74c3e24b9237a2e898c666d86a2675a3fa2e6e051a0d47991fceb38b5c5e93b26d77b4898e9b948d1668a5be0d6f71c0710d0b8e7ccd2d2aeac7eaa6d3e678caba2f37199093a82b19e05401800000be60910dfbbd"]) r0 = open(&(0x7f0000000900)='./file1/file0\x00', 0x200, 0x2) chmod(&(0x7f0000000980)='./file0\x00', 0x10c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000940)={0x32, 0x2, [], [@pad1, @ra={0x5, 0x2, 0xaf}, @jumbo={0xc2, 0x4, 0x48f7}, @enc_lim, @enc_lim={0x4, 0x1, 0x4}]}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x80000, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x1) [ 544.699149] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210ec, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 544.757896] 8021q: adding VLAN 0 to HW filter on device bond29 [ 544.783920] bond0: Enslaving bond29 as an active interface with an up link 12:21:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x8402, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:11 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(0xffffffffffffffff, 0x40045109, &(0x7f00000000c0)=0xa919) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 544.965456] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 544.971756] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 545.017394] loop4: p2 start 420544512 is beyond EOD, truncated [ 545.034690] loop4: p3 start 2114410187 is beyond EOD, truncated [ 545.042329] EXT4-fs: 6 callbacks suppressed [ 545.042340] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 12:21:11 executing program 2: r0 = syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2e2f67696c653004"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)=ANY=[@ANYBLOB='-']) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x2, 0x2f06}, 0x90) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x71, 0x2, {{0x4, 0x3, 0x7}, 0x1}}, 0x18) [ 545.062171] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 545.080446] loop4: p6 start 3496214528 is beyond EOD, truncated [ 545.103583] loop4: p7 start 1581527914 is beyond EOD, truncated [ 545.139328] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 545.148910] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 545.164778] loop4: p2 start 420544512 is beyond EOD, truncated [ 545.178388] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:11 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getpid() mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x84180, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000200)={@in={0x2, 0x4e21, @empty}, {&(0x7f0000000140)=""/20, 0x14}, &(0x7f0000000180), 0x4a}, 0xa0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 545.193878] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 545.210903] loop4: p6 start 3496214528 is beyond EOD, truncated [ 545.225039] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x9, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xb001, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210ed, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 545.316588] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 12:21:11 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:11 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x200000000000, 0x0, 0x0, 0x2811080, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000140), &(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000200)={[{@dax='dax'}, {@test_dummy_encryption='test_dummy_encryption'}, {@resgid={'resgid', 0x3d, r0}}, {@journal_checksum='journal_checksum'}, {@noinit_itable='noinit_itable'}, {@usrquota='usrquota'}]}) [ 545.439122] EXT4-fs (sda1): can't change dax mount option while remounting [ 545.475885] 8021q: adding VLAN 0 to HW filter on device bond30 12:21:12 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000000c0)={0x0, 0x6, {0xffffffffffffffff}, {0x0}, 0x3, 0xbbf1}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000180)={[{@noquota='noquota'}, {@grpid='grpid'}], [{@fowner_gt={'fowner>', r0}}]}) 12:21:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xbc03, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 545.496628] bond0: Enslaving bond30 as an active interface with an up link [ 545.518323] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 545.525376] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 545.569957] loop4: p2 start 420544512 is beyond EOD, truncated [ 545.591771] EXT4-fs (sda1): Unrecognized mount option "fowner>00000000000000000000" or missing value [ 545.594869] loop4: p3 start 2114410187 is beyond EOD, truncated [ 545.623527] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 545.636984] EXT4-fs (sda1): Unrecognized mount option "fowner>00000000000000000000" or missing value [ 545.637060] loop4: p6 start 3496214528 is beyond EOD, truncated [ 545.672742] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:12 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0xf51001, 0x0) ioctl$SNDCTL_SEQ_GETOUTCOUNT(r0, 0x80045104, &(0x7f0000000180)) socket$inet6_dccp(0xa, 0x6, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000000c0)={[{@journal_async_commit='journal_async_commit'}]}) [ 545.696207] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 545.703132] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 545.721842] loop4: p2 start 420544512 is beyond EOD, truncated [ 545.736965] loop4: p3 start 2114410187 is beyond EOD, truncated [ 545.754795] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 545.766051] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 545.784707] EXT4-fs (sda1): re-mounted. Opts: journal_async_commit,,errors=continue [ 545.794470] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:12 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x29c4422, &(0x7f0000000140)={[{@data_err_ignore='data_err=ignore'}, {@acl='acl'}]}) [ 545.807321] loop4: p7 start 1581527914 is beyond EOD, truncated [ 545.906618] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,acl,,errors=continue [ 545.924249] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,acl,,errors=continue 12:21:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0xa, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210ee, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:12 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) set_thread_area(&(0x7f00000000c0)={0x9, 0xffffffffffffffff, 0x400, 0x0, 0x1, 0x1, 0x1}) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000180), &(0x7f0000000200)=0x4) 12:21:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xd002, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 546.098722] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 546.108994] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 546.124291] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xd802, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:12 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="2e2f66696c653000a9db6adc5ce054aa0400f5631e1a00c50cc9e5f64f86bc00a9aa82653b026a22d10da9013deb0d83cc3b5e1407f7fce90acd73eb0ca3fd0450241227a0743bb3e93c56dc629b1a2d9bbc3f000000fa51cea27053f79b596b8a465f53625f9569305a772a971ebc51e4fc2819d8bc22a6537e3f76365ed5103c679154e0a30f7415a49528dfccdd4dc13e85ab7856b1695a94a9747e714e73c95ce344e10db19a3a05feb762b9220497c5c525d69b92adf8d809830ee29dfbbe1cea196c739a749f9effb5b2edc5a7dbd9e9b0ede30f71ed41dcaa26a545cceecf9919acbef4aff24b7efdfb2d5e7dac013649ffc992"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000140)=ANY=[@ANYBLOB="92d8503fb247441f1d78976e00"]) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$SNDCTL_SYNTH_ID(r0, 0xc08c5114, &(0x7f00000002c0)={"17e520c1b89d65b6c8dfca4399b6ca84985e92bd81d1aa61011f345c09f7", 0x80, 0x1, 0x0, 0x200, 0x8, 0x2, 0x1, 0x2, [0x5, 0x7, 0x7fff, 0x5, 0x0, 0x6, 0x0, 0x8, 0x2, 0xffffffff, 0x3, 0x2, 0x0, 0x0, 0x5, 0x4, 0x5, 0x100, 0x800]}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x2200, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x9) creat(&(0x7f0000000080)='./file1\x00', 0xb0) [ 546.182005] loop4: p2 start 420544512 is beyond EOD, truncated [ 546.192937] 8021q: adding VLAN 0 to HW filter on device bond31 [ 546.200599] loop4: p3 start 2114410187 is beyond EOD, truncated [ 546.210566] bond0: Enslaving bond31 as an active interface with an up link 12:21:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0xb, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 546.245444] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 546.271445] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xe001, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 546.311266] loop4: p7 start 1581527914 is beyond EOD, truncated [ 546.343185] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 546.348917] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 546.377014] loop4: p2 start 420544512 is beyond EOD, truncated [ 546.402491] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:13 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0/file0\x00', 0x3, 0x0, 0x0, 0x301000a, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) r3 = socket$phonet(0x23, 0x2, 0x1) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000380)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_ASSOCIATE(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x2c, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @random="a1586a07dff5"}, @NL80211_ATTR_USE_RRM={0x4}]}, 0x2c}}, 0x0) r7 = socket$phonet(0x23, 0x2, 0x1) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000380)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_ASSOCIATE(r8, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x2c, r9, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r10}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @random="a1586a07dff5"}, @NL80211_ATTR_USE_RRM={0x4}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x70, r5, 0x8, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r10}, @val={0xc, 0x99, {0x8, 0x42}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x70}, 0x1, 0x0, 0x0, 0xc084}, 0x80) [ 546.429598] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 546.445905] 8021q: adding VLAN 0 to HW filter on device bond32 [ 546.452698] loop4: p6 start 3496214528 is beyond EOD, truncated [ 546.470659] loop4: p7 start 1581527914 is beyond EOD, truncated [ 546.474637] bond0: Enslaving bond32 as an active interface with an up link 12:21:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 546.583602] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 546.600283] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 546.618693] loop4: p2 start 420544512 is beyond EOD, truncated [ 546.634089] loop4: p3 start 2114410187 is beyond EOD, truncated [ 546.651435] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 546.668613] loop4: p6 start 3496214528 is beyond EOD, truncated [ 546.682338] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210ef, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xf201, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:13 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='?/file0\x00'], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000400)={'team0\x00'}) socket$netlink(0x10, 0x3, 0x6) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)=ANY=[@ANYBLOB='\b']) r2 = syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./file0/../file0\x00', 0x40a, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000200)="80e3212f8cba5925c0b8ce3c5e1b9e5f864db4a6dbd501a33b5ade2a0676d7e1b5a9f103274446c2f8bed3c139255588079d20527476849478a07bcd05054a61c96537b9661326447a888e13fb063eb9b01549de59eb7490298c293f5bea480a3690b25c8b60d2c67801dc32ec016f74f2de3f8a66673f3704485b20157c086ff09186c3a70fb39dc563540e6ea60c76cf08132c045ce925c64e1fa5ca", 0x9d, 0x3f}, {&(0x7f00000002c0)="05f01bb5dc5c6fd58746646f4d7e5034bf42120cd65965ac7fce8bc80e99e2986d94f68fdd907de61df59657def1793b968a1be5a35eddb5a5e8a9dcc1361f232746b19a43400de42b2d3f1d21ed3b519a84f27fd042883e1279a951b755c326f3a805a30579f39c69c738abf419fa91d789be67625be0e0d6dec99476bfa93bfbe3f60d3f433b8d927c7ddedbd3000a24fa391c2440459eda50dd793e6712ddbe490e3c73cc1b80704003e770511841ae0a71e29266953205f334d09bb2afd0d4c4a30209ec548b939fdfc9e4dde0bd6cc2f7215b018e5f66bd26929be264163e1f31af54915dbdd29d2918", 0xec, 0x5f71}], 0x40000, &(0x7f0000000480)=ANY=[@ANYBLOB="6e6f61636c2c626172726965723d666c7573682c646174613d77726974656261636b2c757365725f78617474722c61707072616973652c736d61636b66737472616e736d7574653d262c00518ea7205b92334ff66ee158d4d550e18b04b256c74aba493f"]) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)=0x801) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) [ 546.923997] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 546.943096] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0xc, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 546.976569] loop4: p2 start 420544512 is beyond EOD, truncated [ 547.016271] loop4: p3 start 2114410187 is beyond EOD, truncated [ 547.035873] nla_parse: 9 callbacks suppressed [ 547.035884] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 547.068184] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000000)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 547.104016] loop4: p6 start 3496214528 is beyond EOD, truncated [ 547.121954] loop4: p7 start 1581527914 is beyond EOD, truncated [ 547.151679] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 547.157435] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 547.189655] 8021q: adding VLAN 0 to HW filter on device bond33 [ 547.197067] bond0: Enslaving bond33 as an active interface with an up link 12:21:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xf403, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000000)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:13 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(0xffffffffffffffff, 0xc0045520, &(0x7f00000000c0)=0x8) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x3ff, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 547.233538] loop4: p2 start 420544512 is beyond EOD, truncated [ 547.240492] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 547.263197] loop4: p3 start 2114410187 is beyond EOD, truncated [ 547.318200] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 547.344023] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:13 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000300)='./file1\x00') mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) sendmsg$NL80211_CMD_SET_WDS_PEER(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xabc52170b5881048}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r0, 0x20, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @random="08f3e194ce86"}]}, 0x40}}, 0x40000) [ 547.372010] loop4: p7 start 1581527914 is beyond EOD, truncated [ 547.518428] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 547.524130] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 547.565602] loop4: p2 start 420544512 is beyond EOD, truncated [ 547.588480] loop4: p3 start 2114410187 is beyond EOD, truncated [ 547.618259] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 547.652846] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:14 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000380)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_ASSOCIATE(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @random="a1586a07dff5"}, @NL80211_ATTR_USE_RRM={0x4}]}, 0x2c}}, 0x0) r4 = socket$phonet(0x23, 0x2, 0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000380)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_ASSOCIATE(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x2c, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @random="a1586a07dff5"}, @NL80211_ATTR_USE_RRM={0x4}]}, 0x2c}}, 0x0) r8 = dup2(r5, r4) sendmsg$NL80211_CMD_JOIN_MESH(r8, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x70, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x3, 0x4}}}}, [@NL80211_ATTR_BSS_BASIC_RATES={0x7, 0x24, [{0x1, 0x1}, {0x36, 0x1}, {0x3, 0x1}]}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, @random=0x3f}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x400}]}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_HANDLE_DFS={0x4}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x2}]}, 0x70}, 0x1, 0x0, 0x0, 0x11e2a19f5a884916}, 0x24000081) sendmsg$NL80211_CMD_SET_NOACK_MAP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r6, 0x100, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x101, 0x38}}}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x20}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x810) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 547.677234] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0xd, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210f0, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000000)) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xf803, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 547.865188] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:14 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'macvtap0\x00', {0x2, 0x0, @local}}) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) recvfrom$inet6(r2, &(0x7f00000000c0)=""/23, 0x17, 0x122, &(0x7f0000000140)={0xa, 0x4e22, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xaa3}, 0x1c) [ 547.979048] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 547.992377] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 548.009540] 8021q: adding VLAN 0 to HW filter on device bond34 12:21:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 548.026436] bond0: Enslaving bond34 as an active interface with an up link [ 548.027085] loop4: p2 start 420544512 is beyond EOD, truncated [ 548.063437] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xff00, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 548.101684] loop4: p3 start 2114410187 is beyond EOD, truncated [ 548.130606] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:14 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000780)='./file0\x00', 0x0, 0x1049018, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) 12:21:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0xe, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 548.156225] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 548.201089] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:14 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sysvipc/shm\x00', 0x0, 0x0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000140)={0x6, 0x4, 0x379b, 0x5, 0x6, 0x1f, 0x18, "c3581869a6363881108c036d20f326b8b0249584", "a533a79a0bc7d64ab0a9346584ba8bbf680dc863"}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 548.257435] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 548.365170] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 548.371444] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x40000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 548.409803] 8021q: adding VLAN 0 to HW filter on device bond35 [ 548.417321] bond0: Enslaving bond35 as an active interface with an up link [ 548.435099] loop4: p2 start 420544512 is beyond EOD, truncated [ 548.469411] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 548.486563] loop4: p3 start 2114410187 is beyond EOD, truncated [ 548.505325] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 548.531758] loop4: p6 start 3496214528 is beyond EOD, truncated [ 548.546198] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210f1, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x100000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0xf, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:15 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$BLKRRPART(r0, 0x125f, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) quotactl(0x6, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000200)="e3ea4610ae39ef9d00a9ca81b1cda380ad6880554c245494b9e4422b9bdc06a4a8b39feec904071d0e5e842ba53cf3925625cc712ee47ec29de7641642d90af9939df1ba05552d53dbd3b0c88343102c6398") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCSBRK(r4, 0x5427) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000300)=0x2) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0xfffffffffffffff8, 0x4000) ioctl$DRM_IOCTL_SET_UNIQUE(0xffffffffffffffff, 0x40106410, &(0x7f00000000c0)={0x4d, &(0x7f0000000140)="1eeba4b95830cca89f306700d74bc282109b24c8dbe38c949500197b34a9c9a6d3a8f9982e6f86e7592a395fcac651f3b12bc1e8cb3b5aa698773a2e31276c856d66c106a3e74b52cf4f7a92e8"}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCGPROP(r6, 0x80404509, &(0x7f0000000340)=""/212) [ 548.740103] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x1fffff, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 548.893038] 8021q: adding VLAN 0 to HW filter on device bond36 [ 548.903377] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 548.912065] bond0: Enslaving bond36 as an active interface with an up link [ 548.913679] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:15 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000200)=""/172, 0xac, 0x40000000, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) [ 548.958629] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 548.983265] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x0, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 549.031238] loop4: p3 start 2114410187 is beyond EOD, truncated [ 549.070564] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:15 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=@sg0='/dev/sg0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 549.100746] loop4: p6 start 3496214528 is beyond EOD, truncated [ 549.131571] loop4: p7 start 1581527914 is beyond EOD, truncated [ 549.238838] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 549.251514] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:15 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000007c0)=ANY=[@ANYBLOB="2e2f66448c99381651e7dfd6941006c561e0d900"/35], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000140)='\x00', 0x6, 0x7, &(0x7f0000000640)=[{&(0x7f0000000200)="148538ca56537dc588bb1cfa9fed42df2d7c5cf1d66c159c61038c073ca9d99b6b010ca9581e9f7c2e967c70117618e28b7d29831b3056703417c98e7ea99c4b7827d384f1fcf10d85224c169a6b32b82b00044920c30012f22029b16c25912e665689d5388dde27e0303cc10fd1f0af926d2e4f7c9f87965a1fdc28a50d89c88e4c6cea5d9bbc7e5c2cc62bf39a63e125c3a8d18b01842833108aa6122c42560ccd6a80db1abc527fc7f3", 0xab, 0x61b}, {&(0x7f00000002c0)="d0e19179d43b96fce40aa699c37f00da1bf2e9756b6ff8f65db4dc0fee79af7f5007787a356d4907511b6d51d8e1a72b4c5d3b86cafefcc696b71480688d99416ee90f097c5133f47454b19b434c87a74705fff1e6dea8777fc811c64a1eb32ba37c1f0a8ba9", 0x66, 0x1}, {&(0x7f0000000340)="5b0f902fb3b1ee1946c822edff21f844277159f20afb75ebff37f218ca22396c16792c8b7c1a90665485a237346e75dce02d2f036d5952f11fa02434eb64a9c1286be714d1d5abd6db5dc065a1d72f875081f39c3fd22052b588a12b707d5c", 0x5f, 0xdd}, {&(0x7f00000003c0)="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", 0xfb, 0xb9}, {&(0x7f0000000180)="fcfa8636dbfb7796d7e2dc89b241", 0xe, 0x2b06d711}, {&(0x7f00000004c0)="6ef14c5a1246a317d634686cda37b894b6c800475f87e68fdb4bf4ceb425ff7d3118926acb00649a04aedb0a3afee1457af393738eb53af9048e6a047dbcab85f14ea2a10f007e6b2ea544f9fb2770f8f9d78455eeb0f78affac731cc32cc0d8e6edff0c2e8f3bce4729339a6e2ea7740fa4d8d8a5594513bcd3d56c6a4b7e4fb343f13e3e3694c53fde3dff1cf1907d5e1501ccc76f19644c4022886ea127ed0c0c1bce32487639c08faf6c54c9c4fecd2cfabde9cf8d6b65f2a9b9d87b5688830394356ed8b6a9931361d2dafcccd482bef5310ddaffb3783c15442d8baf9f4c1eff000605baf851", 0xe9, 0x401}, {&(0x7f00000005c0)="d4b5dec9dc476811ff62677792273e37622cea7620a08f6dbd2476d203f3da8d92718efdaa4cd9fea05081ac0d646b9226c0ad015f15172ccde86af4f720d0e6a034963b7dc14dc478fc30dcc9f441ae8ca953c81bf76a85f72397e20851bbb2f4b58bfbd6ae8a79", 0x68, 0xfffffffffffffffe}], 0x11002, &(0x7f0000000700)={[{@space_cache_v2='space_cache=v2'}, {@thread_pool={'thread_pool', 0x3d, 0x3f}}, {@ref_verify='ref_verify'}], [{@seclabel='seclabel'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) [ 549.281464] loop4: p2 start 420544512 is beyond EOD, truncated [ 549.300955] loop4: p3 start 2114410187 is beyond EOD, truncated [ 549.326687] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 549.359588] loop4: p6 start 3496214528 is beyond EOD, truncated [ 549.373744] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:16 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f00000000c0)={0x2, 0xda8, 0xffffffff, 0x5, 0x6, 0x80000000}) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 549.506636] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 549.521405] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 549.533601] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210f2, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) 12:21:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x1000000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x10, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:16 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f0000000240)=ANY=[@ANYBLOB="006261bd93ada0eea438784884a07373c7b4acd1cb61cd5a7e7ba8885ff85ccd38cb7743070d06fb2f13ade3f2e697b2593174d8471d7002f4a810049f6388e1f3dc5eb43cacb21025d02b6934e1fea8c7a004b27351b3bb850a15f6ff663291441a02556702c78e59f1cf377ca7"]) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, &(0x7f0000000140)={0x20, 0x3, 0x40, 0xcf, 0xffffffff80000001}) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x4, 0x400) connect$caif(r0, &(0x7f00000001c0), 0x18) 12:21:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 549.572859] loop4: p3 start 2114410187 is beyond EOD, truncated [ 549.595125] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 549.603702] loop4: p6 start 3496214528 is beyond EOD, truncated [ 549.610847] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 549.705589] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:16 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 549.817825] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 549.823726] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 549.834608] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2997 sclass=netlink_route_socket pid=16574 comm=syz-executor.1 [ 549.843220] loop4: p2 start 420544512 is beyond EOD, truncated [ 549.856229] 8021q: adding VLAN 0 to HW filter on device bond37 12:21:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x2000000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:16 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) [ 549.876309] bond0: Enslaving bond37 as an active interface with an up link [ 549.912954] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 549.922897] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 549.946562] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 549.964512] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x11, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 549.985387] loop4: p7 start 1581527914 is beyond EOD, truncated [ 550.042963] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 12:21:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 550.073643] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 550.098763] loop4: p2 start 420544512 is beyond EOD, truncated [ 550.126752] loop4: p3 start 2114410187 is beyond EOD, truncated [ 550.145706] 8021q: adding VLAN 0 to HW filter on device bond38 [ 550.148082] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 550.166874] bond0: Enslaving bond38 as an active interface with an up link [ 550.168994] loop4: p6 start 3496214528 is beyond EOD, truncated [ 550.180971] loop4: p7 start 1581527914 is beyond EOD, truncated [ 550.281603] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 550.287140] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 550.324983] loop4: p2 start 420544512 is beyond EOD, truncated [ 550.344082] loop4: p3 start 2114410187 is beyond EOD, truncated [ 550.367811] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 550.390941] loop4: p6 start 3496214528 is beyond EOD, truncated [ 550.407302] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210f3, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x2010000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:17 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2e2f66696cf43000e969fa7514fa3c795b84898c13fcb9f785"], &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000600)={0xd0, 0x0, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER={0x78, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9392}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8e19}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x82}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x792}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40080}, 0x4) r2 = dup2(r1, r1) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000500)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r2, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x34, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x4c, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xdec6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x9}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x50}, 0x4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x1, &(0x7f0000000100)=[r6]) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_SET_WOWLAN(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000700)={&(0x7f00000007c0)={0x438, r7, 0x1, 0x70bd26, 0x25dfdbfe, {{}, {@void, @void, @val={0xc, 0x99, {0x8, 0x7}}}}, [@NL80211_ATTR_WOWLAN_TRIGGERS={0x37c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_GTK_REKEY_FAILURE={0x4}, @NL80211_WOWLAN_TRIG_MAGIC_PKT={0x4}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_4WAY_HANDSHAKE={0x4}, @NL80211_WOWLAN_TRIG_PKT_PATTERN={0x364, 0x4, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_PATTERN={0x2d, 0x2, "fa7a1c91416c2134e1dd773d2107729894de82062972c26c5354e38d14a0167c654b00d97f86d1fc14"}]}, {0x32c, 0x0, 0x0, 0x1, [@NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x8000}, @NL80211_PKTPAT_MASK={0x102, 0x1, "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"}, @NL80211_PKTPAT_MASK={0xb2, 0x1, "f22ae3f7104b84bdbf6b1e4214d997091adec7f3365d9f5c0bd713295bb710ab54dc5a32218bf89f26b46d8429d0dbb1854fa4a8782ec64e2f1f21befca3515a0c46392e3893e472267df34277c511cbbed2d87693cc799d403b4459287cb8acb68b81337046028b23247d076bed9f2cce3e71aa619d70489de224c5f9f97218328b3690c925a4d6efe50cf5a2e20978774247ea80082de5149dcb331231a9744c1ec0eae64cbd91150252df4b18"}, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x1}, @NL80211_PKTPAT_PATTERN={0x92, 0x2, "8d7f2fae0e8e9165b127ee4145c2fdf37e309940a8f2949fbcf5ac38e4855e903e243b45da2d9e810fdbd3b9c238bbf921bbcc78a5aad4f655fd06b2ebff86fbf93c296177badaa2c905f0b6f43ce100994f788415e8b678673cdc63bf58653ed31126ab1f34146b3f7cd449f91b9cf34bef2d5a05ccf48dde4c83b4c80d9aa63627b15fcf2b7a75437321b09f8b"}, @NL80211_PKTPAT_MASK={0xa9, 0x1, "86c24b311738b24a7caa0a448b7b145a4b3a1378f2d3d0ea8644d1cc466bc3d33b121ce72218a2b1e3b9799def2bdbe29dd86aa4d5376acde674ae145d4b15f8f896c1570566fb1ccb5d61982a6a25c335c408c771abe93ac3358d95309ed62f233d6a99ba5385037cb7eb3835fe9a1c990bfc2345fb3a900ed92c013a7313c8ddcfdd008f72107c2f07547eb80baef5c4b902c5ead5295d1e6dd3bc81c2bb7c7e36bc12e3"}, @NL80211_PKTPAT_PATTERN={0x1d, 0x2, "066b560ba9c685d45e59a676b6212a453eadc6f0823750af0c"}]}]}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x4}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x6c, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_TCP_CONNECTION={0x64, 0xe, 0x0, 0x1, [@NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @remote}, @NL80211_WOWLAN_TCP_DST_MAC={0xa, 0x3, @broadcast}, @NL80211_WOWLAN_TCP_DST_IPV4={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1d}}, @NL80211_WOWLAN_TCP_SRC_PORT={0x6, 0x4, 0x8001}, @NL80211_WOWLAN_TCP_DST_PORT={0x6, 0x5, 0xc414}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_SEQ={0x10, 0x7, {0x3, 0x7fff, 0x8}}, @NL80211_WOWLAN_TCP_DATA_INTERVAL={0x8, 0x9, 0x7}, @NL80211_WOWLAN_TCP_SRC_IPV4={0x8, 0x1, @remote}, @NL80211_WOWLAN_TCP_DATA_PAYLOAD_TOKEN={0x11, 0x8, {0x0, 0x80000000, "5c9e148648"}}]}, @NL80211_WOWLAN_TRIG_ANY={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x14, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_RFKILL_RELEASE={0x4}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}]}, @NL80211_ATTR_WOWLAN_TRIGGERS={0x18, 0x75, 0x0, 0x1, [@NL80211_WOWLAN_TRIG_ANY={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_EAP_IDENT_REQUEST={0x4}, @NL80211_WOWLAN_TRIG_DISCONNECT={0x4}, @NL80211_WOWLAN_TRIG_ANY={0x4}]}]}, 0x438}, 0x1, 0x0, 0x0, 0x40800}, 0x24000050) ioctl$USBDEVFS_DROP_PRIVILEGES(r4, 0x4004551e, &(0x7f0000000240)=0xe9) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000280)=0x3) fchownat(r0, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, r6, 0x1000) 12:21:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 550.555582] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16674 comm=syz-executor.2 12:21:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x12, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 550.625399] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16679 comm=syz-executor.2 [ 550.649254] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 550.654734] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 550.669908] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16679 comm=syz-executor.2 [ 550.697450] loop4: p2 start 420544512 is beyond EOD, truncated [ 550.711972] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x3000000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 550.721868] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16674 comm=syz-executor.2 [ 550.731852] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x0) 12:21:17 executing program 2: r0 = syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) signalfd(r0, &(0x7f0000000040)={[0xfff]}, 0x8) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000000c0)={[], [{@audit='audit'}]}) 12:21:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x0) [ 550.769678] loop4: p6 start 3496214528 is beyond EOD, truncated [ 550.798779] loop4: p7 start 1581527914 is beyond EOD, truncated [ 550.839341] 8021q: adding VLAN 0 to HW filter on device bond39 [ 550.849219] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 550.863436] bond0: Enslaving bond39 as an active interface with an up link [ 550.872322] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 550.899176] loop4: p2 start 420544512 is beyond EOD, truncated [ 550.913232] loop4: p3 start 2114410187 is beyond EOD, truncated [ 550.922418] EXT4-fs: 22 callbacks suppressed [ 550.922429] EXT4-fs (sda1): Unrecognized mount option "audit" or missing value 12:21:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xa000000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:17 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x14000, 0x0) mmap$xdp(&(0x7f0000ff6000/0x7000)=nil, 0x7000, 0x2000008, 0x810, r0, 0x100000000) [ 550.946018] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 550.963961] loop4: p6 start 3496214528 is beyond EOD, truncated [ 550.975669] EXT4-fs (sda1): Unrecognized mount option "audit" or missing value [ 550.990845] loop4: p7 start 1581527914 is beyond EOD, truncated [ 551.108210] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 551.116653] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 551.117427] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 551.142350] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 551.155902] loop4: p2 start 420544512 is beyond EOD, truncated [ 551.175819] loop4: p3 start 2114410187 is beyond EOD, truncated [ 551.203944] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 551.225313] loop4: p6 start 3496214528 is beyond EOD, truncated [ 551.243865] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210f4, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:17 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x7ff, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f00000000c0)={0x0, 0x0, 0x0}) r1 = syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x1049008, 0x0) syz_mount_image$reiserfs(&(0x7f0000000640)='reiserfs\x00', &(0x7f0000000680)='./file0\x00', 0x3, 0x9, &(0x7f0000002dc0)=[{&(0x7f00000018c0)="5c34d4d61e74f41be23c72341f7c1700aee164f982f14ee1e03b61608e41dd86e14b0224a732215ffbfbeb9f7439d6c78778f8364032819b8e75142283b788a05bdf853fce68ec2c9cb0c585e5e41d62183120964a610b99a45cb2b10eda284b84cd40c7c0413ade16c11eabda8cbdf438b96c041f141d13cc5c280534060689f58272358d5571186e01880660d7a926302fc9405ffe2534cb0b68da0c73a8fb7860e468d9022aa30c5c6c24a82b83f7f1d3e23dfa91a39a0f01d1ee320f3daabec598946c4b990e35f39886559f3d98a5af4215b3423389fa39b3b795a691e3428ef515085bd56c8fedb000a5dde2700a88dc55ac", 0xf5, 0x3}, {&(0x7f00000006c0)="81abefc9c6b725f4caa0dfd9bf0ffe1eb9b9185af3e3d4db815bc784cfb2517f1e059a93e448ff0e4cec52c195be47714a2906295a9397ff91f79bca6a13cfcb6b7787bdcb31f1a6304330dbeb9641ced92406362761b00f1a21220fdb6a9c0d71184a7bef66f9d8c350e9ecf7001070ed6d9db0f7690879876309648e868e58623adfcec9e4f4912738e4860d496a4fe9b49520441ee9b8b940b8ba8763dd7b2024083374f4", 0xa6, 0x6f}, {&(0x7f00000019c0)="98001169290d880dd1ebbcccc006c9902f63cdd45c9cdbeaa6bc48d6991159d5a6cde484bd047c7e216f0905bf68274d90adfcf034821cf23faf6613fdc4c13c28803685e5b1df41ac796be85cfb9cfa5245de6ddf95dc69fb969f31fcfea6dc08afe9766bb11d395aefd246b02bbcdcac93c4a22296d836e493dd63de4e26443a2bf2a0658fd1fd63fbd058315476f976cd8c", 0x93, 0x80000001}, {&(0x7f0000001a80)="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", 0x1000, 0x33a5}, {&(0x7f0000002a80)="f07cb33d9bfa14377711fd7864f670def0c454bc66d0ec51323f01b63a5ece44c9c956d0f4e9c90e35085a094408f5042836b904824a3b69e1b370277bbaaf0191743429748f821701fbaac80f41650a7f27a32b6d666d0a205bca8b1796d2a341421083a57b28c9ed0a451bec", 0x6d, 0x2f4}, {&(0x7f0000002b00)="d6e1287d1c4620510fb5e1a4900f7cd807d85dc02ddd12524dbc3ffa5ed1af2be51ba174344c64fff97515bda9535f6cea466a57bc547af5b9ad29b052b57155daf37e2d3cab81c048227e85fbb5f12b19cb2c148f9f7ad41a60864c12c62cb2f0d44921c9f175748b1ce6591e5ccadc0eb5a1573017708476be3eb847e3b91ff8508f5da7d723150bb8e8f56519c65b7d45162303a6855559b3805c0e75792ac7e068e3015922141ddff6f35b31ad3dfb8f8bebc3f971d1b74d34a5b6f5f9d8ca73fc72b96a43263ceb1bdec1ffe13c2e432b9f52557b4dcf8acbb9c6ac58122e0bd39697a5e4a699e3b1fb76dc66cc6a34e488164702d67d8c2b", 0xfb, 0x56}, {&(0x7f0000002c00)="74114ae799ecec3de8beabbda353fbf32cb62e015b4757e938e8c41ad3a46ccba69513adb3365c9d0cf0da1d5a03fed84af3876513ebd00ccab65f09acc6c2e554cfcc0753392edee43b52a50d4f0622e14cd3b6eb8ddb9e995f72cf19e29488baf305a8010ae8c44a2e98743d3849ab2f4c23b392e6b1320bcadc9b0d7e3a5f27072ac244647e3bffa98473eca62ddc352a3ecac67f53669969564cde2df585568843c2a873b3e08cda0ed1f4dca8629afea12ee39fc9f23b7bc44ade91d1b1cc08076ec67cef", 0xc7, 0x5}, {&(0x7f0000002d00)="e725aed1cab5", 0x6, 0x6}, {&(0x7f0000002d40)="bcd15e2420c98248e93e4b3d0955c1c18f8a3f084cfa8d16c2975d386d6246c9b8ffa9359bc27516479f47e3fb9be9e974f7c8b37a0b7c064f10d0a5f0c033f9149e56c4226ee6652f93cf7b805dc86bdc1ccf4f35dbe8fb1d2ddbda880b735de53eb5ce8aefe0c62aa756", 0x6b, 0x7}], 0x802001, &(0x7f0000002ec0)={[{@balloc_border='block-allocator=border'}, {@barrier_flush='barrier=flush'}, {@jdev={'jdev', 0x3d, './file0'}}, {@balloc_test4='block-allocator=test4'}, {@usrquota='usrquota'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@usrjquota='usrjquota'}, {@usrjquota_file='usrjquota=syz'}], [{@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x64, 0x63, 0x33, 0x36, 0x35, 0x63, 0x34], 0x2d, [0x66, 0x39, 0x37, 0x66], 0x2d, [0x39, 0x31, 0x63, 0x38], 0x2d, [0x66, 0x38, 0x64, 0x63], 0x2d, [0x66, 0x31, 0x34, 0x38, 0x38, 0x3b, 0x33, 0x32]}}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x62, 0x34, 0x34, 0x35, 0x34, 0x66, 0x62], 0x2d, [0x30, 0x36, 0x34, 0x39], 0x2d, [0x39, 0x36, 0x35, 0x30], 0x2d, [0x39, 0x32, 0x74, 0x65], 0x2d, [0x39, 0x31, 0x30, 0x65, 0x66, 0x39, 0x35, 0x34]}}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@smackfsfloor={'smackfsfloor'}}]}) prctl$PR_SVE_GET_VL(0x33, 0x1df2d) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, &(0x7f0000003000)={0x80, 0x2, 0x3, 0x94, 0x1, [0x45c, 0x7, 0x1, 0x2]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in=@initdev}}, &(0x7f00000004c0)=0xe8) statx(r1, &(0x7f0000000500)='./file0\x00', 0x2000, 0x80, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x5, &(0x7f0000000340)=[{&(0x7f0000000180)="c8ca5a371539878a4842f250bad1530f750ccb3a6329f2ce56b37451781063edd72fa947a4feb0d447d1a6f54deafaea7c610afd961dd0b3c07c00d4", 0x3c, 0x2}, {&(0x7f0000000200)="b6f61764adf17a740f1811736241de7c755f99", 0x13, 0x1}, {&(0x7f0000000240)="418355349c6d7265b9f7b105ba666b7f7ba585c68f5cbc848594b640e6dae4309f7ea4d6b0c4d2041c2fe92f65f6e11afffae7d29c2379d36914c81cf382bae80c34dc943a36291ec6ce1b06fd", 0x4d, 0x3}, {&(0x7f00000007c0)="fcd46d451c94bf7c527a58fa718e2ce66aec68f19cf246d2a453cdeec945d3448b95d1bb3cdba67c6a259576cc7c199aa56863c9e98d017bd40f0d3a3c1ae931d2506b9ea152c3411040a62482c6146b0a4725bb95cfeaf25872f5eab85ded4efff744562465687674c2ac58cfab861e3c09df2a8eeba2afc4dc2d955471d593f62691492c6e484c4b45c403f239f07180cebc47965e99a980a6e5aac9f5ccc4105c80c65727bd1f5cacaf1e435118824d02f01c0bd5534754910acf0017810018af4e6d473192f922c0c2099402ee52d6c56946d9d40a32c171f0ec619183fb623ca6ea048c997b7e8d270bc0c926cbc1fb679c46cdfd051a2e4b4b6a71e5c3c2ce23db6408b6465f61993c3d231a452c07bd12d08198fc8718750068dd700a44c0f43a90b65f441dfdfac270a0c42b60fd67bc19330cf3724a6a57a6777b8c8f36990246195be2f73c748fb4e11340e72b34c95e8388a48e0e8eef552ea1f2fad0e2dd8f54ab5ff06a3baa4bec6c541866b568f1f2d9c851e8c93d9c40f2d0143237eb684f4433864307642a20c98db97ac178b562d5c26c9b693172e78d156cf525de6a9834d44ebb522273945003d949e40b0e9a190ed92dffbe94501c52e577f4bf73be4aa4bf64f4f7a72fc1c9a4176023b519d788470dbbad85f60cebe8f3961c0755d4de7d6d767b3704a539f179a154db7f00a8948f008a4d9e459c2b5a65ee4a3446408d527b8dcebfa681313434dcd3160d70accae014e2c3eaaaa1e98b42a787c27ed66c49147f0cb320ce17c5116a7ae5c53bfe17fabd5873614fdad1d1d1e15000752d32778b820cb6c3b95460d1612059e6b00d73cc810b0f145570515d1dffda1ee708ff7d82140bde63c17ed0d5274fb2be5804ef1f30f7eaea22f243976e44eee65e95b9b6db983978fb217869ca1843937e437f13529bdd251963cb79a4e50313c0ecf88652985d91b1bbad548a8c4743a60b7f60e24ffa1ea0097076108dd08686ce691b6e595cc4a183ab156d0f81edfa49697dc2b7f036608c92fe6623cd0c10ade675678cb9a53a2c7ba1ff55856218407004c8b596723ff87b999e5d5443ae43db6620939f1c7770c49e7b9ad197227ca44fc0be317fa27c0d661030316fd47417d115c0700b306517b1b983efc758aaa60208155d7501ca9d03f66452630ad8c3e423355cb677179fcee66a2ec1789ce87146cf85e694b96987a880ba7fec4b97e7c73816d16841d3f51a86f394e770dced8c59cbd39e5235301a444dad80c9a5b44a91f551a73b26508be18e583e050d35426acfd37b413bd44cc155b8223225925339c612ef77e6531d33f39102161a99794d68406f400f59b37bf682eef1f8ebb4fbb6b08691fb4a3f62759ac4230f5ceb838b94b00ad2ef49f45288522469320a7c32b1af16ef67c0d3be373d8294748bd482df84a5c5af754e11d8848bd4c007a2ff7b7d4e9394a8788b53024293f7b9060b94dcea2f0e433bffc68fc9ab661864d592a35895e5ee583dec1c596b23bdfdb3062738bbec9037f1654290af4b3cfa8ffec9dd499eac8af352ed577608814f8fc2a5c24be50e73bca94e465c8ef37704b9c267d077f8544a9b94cf0e81926821a2140fc89574f0f33da8677d900e5a7191e408cc1bf5564365a73e2118159a6bc623781c7650010ec1cfca8819ec052324334da35c2e3272622cefb331a2688f37634d95e52e3c1afb907f982fa458b02abf401636a866394f87de1028e39ee6d8a3ca296a8e2d49d42f7ed9ebf525fc87b528749d088d87d0ccd237bbcde8a14b157a8f934cc3e67f233609e70de966349a32fa4f3cbd92b7e304ebb71002c09f84eec5a42278ff11226c5e025115cbad1787009d1dc529f90ff8466e1d089b361e3556fc08bc644e9902cfd2b077a2ee33a3d9bb42159909a6b2957701d36ccff74477e8fb01cea296c8bd979c206b07336a60c77fe00adf26f3961c4d25f7a636d0cee0a729c31e10aca02341027452072cc0821963b74ce74f6985a66ccf735b820cc37f47b94d3d6a22454d7251e3ddc24602e17ec2865db83bcfe971ecb8dd9dd44cdce9b25eadc3d67b69b93af8793742af6c22d0026c6d6d2489702b4f7df470317bf613ba192c925bb9d8f08d13c91ab44b1d8687da3db41c55c4f877c9f0fdc05f5d46a902f2648bf594fa91c3fbceacc63f55e8953ecf82347629d674aa8baecb333f81a9dbf0a0b3c6b347317f3804069712c33532c84a86dca97bb8ea774a91704e7c1e792a51ea50ba4a4d0d9d16cfc7f3a1d02e775ba732562694f8524f0953ed1e957a739d1a004eea1d8bd920608655d0e529c0779ea7b447f16279a4037ea699a8d15aae8123b79afeccb5bc38e516df787bcf5d21f5099b8ac31850b90bc9fadc979aa680356b9951a420b94d7399a7a4b473a395dd35f7a529a755769e2811ccb9472f46ed2baf1fae14cda02784472dbc4468e38b5b4f0741ccb7a0605f7969eafe7b7ffa021057490f6587be5bbbf83b45a8f5259f130530406ab659de56526357a02279e82cc46d4c2cf3d1bf7299b62307f385cc5ede59e1fde9e13be6672d6d74dae5a0e8168be034140483c65fb904d33f999f56125aeac7324f6c42410e1dbd6f82645fa42d887fd818401b4e5535f7398c9bd0c5dca1e9dab54616d7da1584450d66f0598e488f0c9c0ad1228032839fdba0d2d8e22ffb985f98773c432c118c6955cccff2ff96692c78b592ef4078b71c59d6d055c8be799d33b0e2484e80d4c3e43c3e637e5a6653146fac720e9c79ed0463dec88c1bba1b163070624b10c300e5686106f12735807d4e0562d694543e94617fed8ebcf7644595f3cedf866b57dd637bc8c3e61a58ac47c8d36fa4e84f6d5d92640d8fac410b98261a80931b47087cd64c3221e878e03b0e8e3240110e31c6c999b92815a6306d356f318dc02e7d459521094e1fb9e3a854d452f7e506341edd86bc5c2a28be9cf3f215beac3026b3202c0f35e4b8d7477ff62a738267f92d4fa2ede7dd1ec2430db3e12a8c331d5fcb93896829309ddc54a75c49fa6ee3db9ae43c13c34b1db4ad1321e54a5322d15211e63593ab23cdaa058db2ee36e50db6463d9007b8a9962ebc402bc87267a7e36d6b97856c3e03de5aa4f5b22aea783491b388ae5371a9ea200f299cc8d722eeb7e8eda210ebfb5a31d9e9b87848d7cadaaaf4a6dc1a26205f1157b70bd8932d35aac7a10d44be10c32b007b74f3672794197df1e45389de6379f0da53e8be01b21e5a0346e8b04c9abe1571503eada67da1a8bf108aacf556bd782d3cbd5174dd675a4f9aed5e2a7ad815181c7e858762d8aaae7e334d925250d2f1e7168c68edeb431a85e3b7d7389a0be34b432ce36097c58fc20f29aad6964ded6b94be9a9ccee1b89d905bfa31bad5b05892fbb8ad9072496516050ac21c372e9b57fa667b18511846127d6db1e7617feaa9342c3dd8198500ee65dbc8c2fd345295893a3fc515a848d3f7ec64b47ab764422c838557464ccc8316ddf3dfe902191b43077d21bf24b924942a1da3af043d9aaf041db2814d3a88283e864366530d4417c9ca7114211f92ad1660d7c97411e2a9e8f5f32364d4bd27075e4300c460b132cba5ee7fd00653fffbedfff3dddeb7c6878eced9751976591398aa821656b89fb497a5d7293d5f8f0fccea11b7c19d3d3f03995ebe952fe12c0900436df680f94d4a48f3025ac5fb2002f639215f44a9f0757d9885261e0ad258cbb552ecc819781681803e70fe1db7dc17a75b1e325d5854c4e487e90ac6ca2cbe7b032d9e271cc1fcaf2c2d0e6ad95db9013e63b9358023d74379d7e2066f826f9391a69dca613b72bdd25d476e5b063b45642e80e52b2826a2336a8ce1aace8e41add5c30ebf0ded8176eaa9d8be3a3cd958e6f4b6284490e40b426dd2a74c02ed02270eedc1eb53462d7007322dcc39319d381bfb5d075a78cccab6c16a568b9f3cdbb8c517548c7990a3d89c81ab54f52bafd9e6c47e2d9cd341b03e1f0a169cbbb401a57e707c70e96114d08aed8262fa5e2d827a5e8c4cb444637fee2123a21d9055cb72eacb3b6c025440a4580a7cb8615ea78e66c839d755e4a35f9af2d08d0a1d465b0fcf80df6ed76ba4906e3c0590996f971abf4190c81df474755544e41970a63bbfae147f75473440a342d79781b2258af56baa2e5f7aa0bc2a2fabe854ef21226c67f2c95d8eba3e0a8d53dfd4d2812af801027fe186f145f15428b0f9ed1b81fa0adf3fc3c6861264a33f9940d17bbc508036e78cefb39ada726b75b0e05b314095a82a1ebfda838ead82d8ac5b3a2a9904d9461bd5e3faf0c96d8433c1563a231c03c0a0c1a2251ed043047f073c4b6f9ad94613bab68f6094570f46f3e063e53e5155f8d6da5bc3b91ad9566405c331f2c9aa71895357cd54d5703f76f74deb73ad6b46f179dfc6eb97b4ff393dc0660e300f2a2a5b9fe759cfdd6993294c7ce698402a55df915e8dd0af44d1a5d52ae8459a55c7ea044e128493be304e063df1e87eef582cc05e870c068256b0aad51e6caaaf56733e41e6b0cd187b0070d2e86e05f35b9ba3b363500a2dfddf969f05ec19e76760120abfe03fa8ee4b97ac783f727eff3ecd5c99af47e256456f46de92c84a8a90b3d1dfa76c3768ed3db800ac64f5f7c91054dbb0ce2fe5617e09830f7f0d242e5df3223e287576bd769d56d6368d8a30ea36352e9c0518ed7e61c6506e4c816c71b4607e18c78ec74a38f011c3efec78f0cc3aed3d04fd1b24f3c94993c2ca7d275eb1bc41e74425f016771f39b2a4b72090fff20d8c3ad3fea764407821075cd06b6627726cc551914ddf9ed3e7c6ab07f3dd847fb64f58a87a19b9daf06875eaa7fb4984b0e94f16519ad2a7af2651d886b10ce3c041aaad9389a52de26f474ee301a59c5b4dc89a75108a6ffeeffbcc49be9e112bbf0967380cbfc4e997ba359584f05a287359ef6620e45af0530bf08047c570d917866556ed09088f7373b423a17dc8b88992051d5a5e070f7fcb34f5a877281f5cf2e2a8632e0cde95b3f340ffc405bd5107cde5fc4c6c0ec76238eb460113fbf6a1b677a0d6b7bd7ecf223e5fe6278a209ae78840061334d394d014f3f9bfe9434a18ca6fd79eb2a387526337b09d1e5f2e5cba9cf468539d4e0cd4e089689d226fbff5efbd3b0f959ea7e9fe8325cfe275f71bab24e03ac42c7ba1af6aa77aa911c02c2626b28e9e550c9b4aedcb7297b23de7cc6fb1b0cbc439a3c1d4a0e9b6ac81081a454331027e1f2d5c224b59b88e962040f4ec1f5c4f0d397bb5a4d6980e2ea9a620b5995a8fe325199b07a5550c864dd04cea1ac92819c36534342bcd4883d7abba3a21db585a0205da83a1271ec3573f6cf961bc33d13b2fa7001f683467238a040d5e83be0c1aa5758fa420cdc5ca1668226879396756900af1039de7a7d3d21534d46eda6df8cb85aa01468e4d2fb71355b6fb4c2bbbeda6c97ecf8fe0c61a08509dc58765b0bb603127d780031877d3cd957bb4db2e1406df827fde38dfca1c028c81fa412e1309ffdf5a980c16cb264bc6407fd5dc179b883ebd60d6bd6b197162a635e0db20c8313541f349b03dea169e068e21478988f1c88dbca6073060327b2ef222ea6003bce40fa7c3f82853f7e8e8230e1e1f6aae862db735fa60b915f37b2cba7361ee226a272a5b0e4779087b456182c0a9985257fdfd87a006ab3c538fb3d0140ceae51e7be49a1ea952696073b4de0c0fe99bc4", 0x1000}, {&(0x7f00000002c0)="68a80b17d3e0cc034de703aa78aefa03fd5a4f07cbb9b7a04fad8705d18ada52b922afceeb47eb32655d8d4ec7b72c0688e05e5bb4be3c5ec287abe43b38c0a3c829af6fcc39b65f5310d4ac3b2522", 0x4f, 0x4}], 0x40000, &(0x7f00000017c0)=ANY=[@ANYBLOB="61787433002c65787433002c6673636f6e746578743d726f6f742c6f626a5f726f6c653d65787433002c7569643e59f726a651f7e97643fc99b3d0c93ac70374c9a1df53ce9cb3b664638c878f0c0da2443990fc25d2e01f41f3da20f6ce69de0868cb7be7568235fa08a6d151fdcdad740ae9093be45310b85b0817c95791e9acd39bcbfcecb463ed846cde92e13a2e5b425353e2f4f241e88cabb8", @ANYRESDEC=r2, @ANYBLOB=',smackfsdef=,uid=', @ANYRESDEC=r3, @ANYBLOB=',appraise,\x00']) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x28c4422, &(0x7f00000001c0)) 12:21:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, 0x0, 0x0) 12:21:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x13, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x18010000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) [ 551.449415] 8021q: adding VLAN 0 to HW filter on device bond40 [ 551.458403] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 551.479896] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 551.489437] bond0: Enslaving bond40 as an active interface with an up link [ 551.498160] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x18020000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 551.523889] loop4: p2 start 420544512 is beyond EOD, truncated [ 551.541031] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 551.549633] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) 12:21:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x14, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:18 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x4, 0x0, &(0x7f0000000080)) [ 551.586612] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 551.654412] loop4: p6 start 3496214528 is beyond EOD, truncated [ 551.676303] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x20000000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) [ 551.769201] 8021q: adding VLAN 0 to HW filter on device bond41 [ 551.794935] bond0: Enslaving bond41 as an active interface with an up link [ 551.850854] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 551.857363] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 551.876359] loop4: p2 start 420544512 is beyond EOD, truncated [ 551.895947] loop4: p3 start 2114410187 is beyond EOD, truncated [ 551.924603] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 551.949664] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210f5, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:18 executing program 2: r0 = socket(0x2, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) [ 551.969774] loop4: p7 start 1581527914 is beyond EOD, truncated [ 551.994715] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 552.001449] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 552.019426] loop4: p2 start 420544512 is beyond EOD, truncated [ 552.032104] loop4: p3 start 2114410187 is beyond EOD, truncated [ 552.053232] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 552.065607] loop4: p6 start 3496214528 is beyond EOD, truncated [ 552.079493] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:18 executing program 2: setrlimit(0x8, &(0x7f0000000000)) pipe(0x0) 12:21:18 executing program 2: preadv(0xffffffffffffff9c, &(0x7f00000000c0)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) 12:21:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 12:21:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x15, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x3f000000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 552.329769] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 552.343412] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 552.368121] nla_parse: 8 callbacks suppressed [ 552.368132] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:18 executing program 2: shmget(0x0, 0x4000, 0x3d0, &(0x7f0000ffa000/0x4000)=nil) [ 552.405056] loop4: p2 start 420544512 is beyond EOD, truncated [ 552.440624] loop4: p3 start 2114410187 is beyond EOD, truncated [ 552.471754] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 552.476728] 8021q: adding VLAN 0 to HW filter on device bond42 [ 552.503757] bond0: Enslaving bond42 as an active interface with an up link 12:21:19 executing program 2: accept$inet6(0xffffffffffffffff, &(0x7f00000001c0), 0x0) 12:21:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 552.516918] loop4: p6 start 3496214528 is beyond EOD, truncated [ 552.549395] loop4: p7 start 1581527914 is beyond EOD, truncated [ 552.562626] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x40000000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:19 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 552.728969] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 552.740062] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 552.782578] loop4: p2 start 420544512 is beyond EOD, truncated [ 552.810048] loop4: p3 start 2114410187 is beyond EOD, truncated [ 552.835705] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 552.861589] loop4: p6 start 3496214528 is beyond EOD, truncated [ 552.876917] loop4: p7 start 1581527914 is beyond EOD, truncated [ 552.901359] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 552.912554] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 552.932867] loop4: p2 start 420544512 is beyond EOD, truncated [ 552.946598] loop4: p3 start 2114410187 is beyond EOD, truncated [ 552.964155] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 552.981206] loop4: p6 start 3496214528 is beyond EOD, truncated [ 552.995288] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210f6, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=ANY=[], 0xa) 12:21:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 12:21:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x16, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x5c000000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000180)="6bf493cfc08651623ca0d363ac73d140c0e4907388e4ca25d9d754df1ecff4cbceeae62555e8b62496df973da209ae41ca505994abc3a975559b333e8f83bdcdc5f288a8bb7e76e76d12e8b678637ba9a9e4ee5598b16f4a0352a7dfc1010dc4679506b1a91415acbf71ab4e58765c67f09f0ef5225b4c495a96d5a46ce7546e90d0c7393097ac7940821089e4155a83", 0x90}, {0x0}, {0x0}, {&(0x7f0000000440)="a3", 0x1}], 0x4}, 0x0) 12:21:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 553.224428] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:19 executing program 2: r0 = socket(0x2, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, 0x0, 0x0) [ 553.284716] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 553.295359] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 553.329822] loop4: p2 start 420544512 is beyond EOD, truncated [ 553.353055] 8021q: adding VLAN 0 to HW filter on device bond43 [ 553.367679] loop4: p3 start 2114410187 is beyond EOD, truncated [ 553.377002] bond0: Enslaving bond43 as an active interface with an up link 12:21:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x84020000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 553.403298] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 553.425488] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 553.443641] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 553.469437] loop4: p7 start 1581527914 is beyond EOD, truncated [ 553.505169] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 12:21:20 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000440)={0x0, 0x2, 0xfffffffffffffff8}) [ 553.519611] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 553.555389] loop4: p2 start 420544512 is beyond EOD, truncated [ 553.578512] loop4: p3 start 2114410187 is beyond EOD, truncated [ 553.599355] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 553.616008] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:20 executing program 2: r0 = socket(0x2, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000001640)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000001580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) [ 553.630267] loop4: p7 start 1581527914 is beyond EOD, truncated [ 553.718105] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 553.723770] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 553.761517] loop4: p2 start 420544512 is beyond EOD, truncated [ 553.783270] loop4: p3 start 2114410187 is beyond EOD, truncated [ 553.825991] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 553.862310] loop4: p6 start 3496214528 is beyond EOD, truncated [ 553.879904] loop4: p7 start 1581527914 is beyond EOD, truncated [ 553.905332] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 553.913127] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 553.936557] loop4: p2 start 420544512 is beyond EOD, truncated [ 553.960416] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210f7, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:20 executing program 2: r0 = socket(0x18, 0x3, 0x0) recvfrom$inet6(r0, 0x0, 0xfffffe96, 0x0, 0x0, 0x0) 12:21:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x17, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xb0010000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 553.992169] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 554.030653] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:20 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, 0x0, 0x0) [ 554.069804] loop4: p7 start 1581527914 is beyond EOD, truncated [ 554.095314] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000cc0)={0x0}}, 0x88c0) [ 554.208368] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 554.214017] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 554.232980] 8021q: adding VLAN 0 to HW filter on device bond44 12:21:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xbc030000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 554.276689] bond0: Enslaving bond44 as an active interface with an up link [ 554.300980] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:20 executing program 2: r0 = socket$inet(0x2, 0x3, 0xfb4b) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000340)=0x0) getpgid(r1) [ 554.323667] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 554.336965] loop4: p3 start 2114410187 is beyond EOD, truncated [ 554.375976] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 554.404444] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, 0x0) [ 554.446615] loop4: p7 start 1581527914 is beyond EOD, truncated [ 554.487050] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 554.503972] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4040010) [ 554.531462] loop4: p2 start 420544512 is beyond EOD, truncated [ 554.562234] loop4: p3 start 2114410187 is beyond EOD, truncated [ 554.603637] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 554.627911] loop4: p6 start 3496214528 is beyond EOD, truncated [ 554.648568] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210f8, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x4800) 12:21:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x18, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xd0020000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:21 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000024c0)=[{0x0, 0x0, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000100)="fd", 0x1}, {&(0x7f0000000180)="e6", 0x1}], 0x3}], 0x1, 0x0) [ 554.880250] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:21 executing program 2: io_setup(0x8000, &(0x7f0000000000)=0x0) io_destroy(r0) [ 554.969554] 8021q: adding VLAN 0 to HW filter on device bond45 [ 554.991527] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 555.002617] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r3 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 555.013575] bond0: Enslaving bond45 as an active interface with an up link 12:21:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xd8020000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 555.042958] loop4: p2 start 420544512 is beyond EOD, truncated [ 555.054829] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:21 executing program 2: request_key(&(0x7f00000003c0)='syzkaller\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='wp512-generic\x00', 0x0) [ 555.096925] loop4: p3 start 2114410187 is beyond EOD, truncated [ 555.125373] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 555.166950] loop4: p6 start 3496214528 is beyond EOD, truncated [ 555.179878] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:21 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x82002, 0x0) [ 555.215566] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 555.223890] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 555.244477] loop4: p2 start 420544512 is beyond EOD, truncated [ 555.251561] loop4: p3 start 2114410187 is beyond EOD, truncated [ 555.265179] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 555.283465] loop4: p6 start 3496214528 is beyond EOD, truncated [ 555.290259] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 555.377661] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 555.383466] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 555.450668] loop4: p2 start 420544512 is beyond EOD, truncated [ 555.479758] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210f9, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x19, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:22 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f0000000080)={'vlan0\x00', @ifru_hwaddr=@remote}) 12:21:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xe0010000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 555.517732] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 555.540147] loop4: p6 start 3496214528 is beyond EOD, truncated [ 555.546368] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:22 executing program 2: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xc) [ 555.624087] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xf2010000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 555.722619] 8021q: adding VLAN 0 to HW filter on device bond46 [ 555.742913] bond0: Enslaving bond46 as an active interface with an up link 12:21:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000002f40)=[{&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}], 0x1, 0x0) [ 555.777087] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 555.817357] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 555.826614] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xf4030000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x1a, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 555.873426] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 555.922545] loop4: p3 start 2114410187 is beyond EOD, truncated [ 555.956930] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 555.991524] loop4: p6 start 3496214528 is beyond EOD, truncated [ 556.015796] loop4: p7 start 1581527914 is beyond EOD, truncated [ 556.056348] 8021q: adding VLAN 0 to HW filter on device bond47 [ 556.093291] bond0: Enslaving bond47 as an active interface with an up link [ 556.154974] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 556.168332] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 556.189910] loop4: p2 start 420544512 is beyond EOD, truncated [ 556.210021] loop4: p3 start 2114410187 is beyond EOD, truncated [ 556.233234] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 556.253523] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210fa, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) 12:21:22 executing program 2: timer_create(0x0, &(0x7f0000003740)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 12:21:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xf8030000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) [ 556.272650] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:23 executing program 2: add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 12:21:23 executing program 2: faccessat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) [ 556.557899] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 556.563547] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x154, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x154}}, 0x0) 12:21:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x1b, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xff000000, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:23 executing program 2: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="d6", 0x1, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r1) [ 556.650175] loop4: p2 start 420544512 is beyond EOD, truncated [ 556.684328] loop4: p3 start 2114410187 is beyond EOD, truncated [ 556.717181] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 556.752238] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 12:21:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @generic={0x2, "494581a0118dcd4488c661e8dc5c"}, @hci, @l2={0x1f, 0x0, @fixed}}) [ 556.781658] loop4: p7 start 1581527914 is beyond EOD, truncated [ 556.826008] 8021q: adding VLAN 0 to HW filter on device bond48 [ 556.879614] bond0: Enslaving bond48 as an active interface with an up link 12:21:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210fb, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 12:21:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0xffff1f00, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 557.187857] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 557.196928] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 557.233178] loop4: p2 start 420544512 is beyond EOD, truncated [ 557.261496] loop4: p3 start 2114410187 is beyond EOD, truncated [ 557.301393] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 557.335047] loop4: p6 start 3496214528 is beyond EOD, truncated [ 557.372572] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 12:21:24 executing program 2: r0 = openat$md(0xffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x1261, 0x0) 12:21:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x1c, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 557.633503] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 557.650975] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x4, 0x3}]}, 0x18}}, 0x0) 12:21:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x140, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x110, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}]}}]}, 0x140}}, 0x0) [ 557.700815] nla_parse: 4 callbacks suppressed [ 557.700825] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 557.704862] loop4: p2 start 420544512 is beyond EOD, truncated [ 557.769726] 8021q: adding VLAN 0 to HW filter on device bond49 [ 557.795882] loop4: p3 start 2114410187 is beyond EOD, truncated [ 557.804565] bond0: Enslaving bond49 as an active interface with an up link [ 557.815049] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x140, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x110, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "0c6a4c59e84a207af8a77620df52539826ed70b482369835609abd1979dad5281e4452339f6f792507d523c08859ba590f3b2fc4e9b6013553e8bf64082e21d2c1060fc2c56de593a625c61e40d1c03502afb6575fc9e79c10a78e5d1b111ba98ec4075700e6de649209967c697d2a46407716f1198a901ba4821756b3ffb4a1cc687e5b3ff301245f385657313bc8cedc6eeee6c488ab253d7d200f3364e514ba20aacdd1447b27d604b368c37d68b7d1466466b8a08a0ace4f7df6067db2958cd0f6a8279f03f6a593c208006352009d6c6b4ac2a1079c478a2383756a3828fb3b78935333ebf1d117fccd822942f9c1b26342ae1b9b3cbf63e94ebc6d394b"}]}}]}, 0x140}}, 0x0) [ 557.846389] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 557.852009] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x2, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:24 executing program 2: mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) [ 557.896728] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210fc, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x1d, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x140, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x110, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}]}}]}, 0x140}}, 0x0) 12:21:24 executing program 2: socket(0x28, 0x800, 0xffff) r0 = openat$autofs(0xffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x612100, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x17, 0x0, 0x0, 0xc522, 0x415, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x800, 0x200}, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000001500)={0x0, @l2tp={0x2, 0x0, @rand_addr, 0xfffffffd}, @nfc, @nfc={0x27, 0x0, 0x2, 0x2}, 0x3ff, 0x0, 0x0, 0x0, 0xfffc, &(0x7f00000014c0)='gre0\x00', 0x4}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r2, &(0x7f0000000200)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)=""/220, 0xdc}], 0x1, &(0x7f00000001c0)=""/38, 0x26}, 0x140) 12:21:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x3, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 558.066282] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 558.172948] 8021q: adding VLAN 0 to HW filter on device bond50 [ 558.191213] bond0: Enslaving bond50 as an active interface with an up link [ 558.198062] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 558.212490] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x50, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x20, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x50}}, 0x0) [ 558.228777] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 558.255483] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:24 executing program 2: r0 = socket(0x10, 0x3, 0x8) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 12:21:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x4, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 558.280097] loop4: p3 start 2114410187 is beyond EOD, truncated [ 558.318855] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) [ 558.343516] loop4: p6 start 3496214528 is beyond EOD, truncated [ 558.366529] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:25 executing program 2: r0 = mq_open(&(0x7f0000001380)='eth0\x00', 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 558.398139] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 558.407353] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 558.433865] loop4: p2 start 420544512 is beyond EOD, truncated [ 558.460596] loop4: p3 start 2114410187 is beyond EOD, truncated [ 558.483279] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 558.501438] loop4: p6 start 3496214528 is beyond EOD, truncated [ 558.515679] loop4: p7 start 1581527914 is beyond EOD, truncated [ 558.623607] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 558.629583] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 558.672007] loop4: p2 start 420544512 is beyond EOD, truncated [ 558.692710] loop4: p3 start 2114410187 is beyond EOD, truncated [ 558.717180] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 558.741686] loop4: p6 start 3496214528 is beyond EOD, truncated [ 558.756242] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x13, 0x1, &(0x7f0000000400)=@raw=[@alu], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 558.789391] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 558.808385] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 558.833183] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x50, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x20, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x50}}, 0x0) [ 558.840735] loop4: p3 start 2114410187 is beyond EOD, truncated [ 558.858334] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 558.891514] loop4: p6 start 3496214528 is beyond EOD, truncated [ 558.921426] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210fd, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x1e, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xa, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:25 executing program 2: getresuid(&(0x7f0000000000), 0x0, 0x0) 12:21:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x50, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x20, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x1000}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x50}}, 0x0) 12:21:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="24010000d634a4"], 0x124}}, 0x0) [ 559.103856] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 559.210524] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 559.216343] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 559.226224] 8021q: adding VLAN 0 to HW filter on device bond51 [ 559.243009] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:25 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=@newqdisc={0x14c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_choke={{0xa, 0x1, 'choke\x00'}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14}]}}]}, 0x14c}}, 0x0) 12:21:25 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x6, &(0x7f00000000c0)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xfe}, @ldst={0x3, 0x0, 0x6}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x8e, &(0x7f00000001c0)=""/142, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 559.259728] bond0: Enslaving bond51 as an active interface with an up link [ 559.291784] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x5c, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 559.311926] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 559.339796] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x25, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:25 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000003780)={&(0x7f0000000080)=@x25={0x9, @null=' \x00'}, 0x80, 0x0, 0x0, &(0x7f0000002200)=[{0x28, 0x0, 0x0, "48207d2b67a27aea8c0632bd35a267b133"}], 0x28}, 0x0) [ 559.374982] loop4: p6 start 3496214528 is beyond EOD, truncated [ 559.413332] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000000540)={@broadcast, @multicast2, @multicast2}, 0xc) [ 559.461748] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 559.567255] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 559.572855] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 559.613531] 8021q: adding VLAN 0 to HW filter on device bond52 [ 559.623736] loop4: p2 start 420544512 is beyond EOD, truncated [ 559.633222] bond0: Enslaving bond52 as an active interface with an up link [ 559.653849] loop4: p3 start 2114410187 is beyond EOD, truncated [ 559.661571] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 559.673517] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 559.696562] loop4: p6 start 3496214528 is beyond EOD, truncated [ 559.715079] loop4: p7 start 1581527914 is beyond EOD, truncated [ 559.742781] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 559.753520] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 559.774265] loop4: p2 start 420544512 is beyond EOD, truncated [ 559.793448] loop4: p3 start 2114410187 is beyond EOD, truncated [ 559.822012] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 559.842812] loop4: p6 start 3496214528 is beyond EOD, truncated [ 559.860174] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210fe, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:26 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8923, &(0x7f0000000280)={'ip6gre0\x00', 0x0}) 12:21:26 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/248, 0x4000, 0x800}, 0x20) 12:21:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x102, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', &(0x7f00000001c0)=@ethtool_eeprom={0x43}}) 12:21:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x12) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x2, 0x4) 12:21:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0xc0, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x7, 0x0, 0x0, 0x0, 0x50}, 0x40) [ 560.123692] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 560.129779] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x118, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:26 executing program 5: umount2(0x0, 0x1e) [ 560.164476] loop4: p2 start 420544512 is beyond EOD, truncated [ 560.189710] loop4: p3 start 2114410187 is beyond EOD, truncated [ 560.201381] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:26 executing program 2: clock_gettime(0x4, &(0x7f0000000680)) [ 560.225976] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 560.253139] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:26 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5421, &(0x7f00000000c0)={'wg0\x00'}) [ 560.276598] loop4: p7 start 1581527914 is beyond EOD, truncated [ 560.302335] 8021q: adding VLAN 0 to HW filter on device bond53 [ 560.316059] bond0: Enslaving bond53 as an active interface with an up link [ 560.362708] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 560.417495] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 560.423213] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 560.446431] loop4: p2 start 420544512 is beyond EOD, truncated [ 560.459802] loop4: p3 start 2114410187 is beyond EOD, truncated [ 560.475717] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 560.498626] loop4: p6 start 3496214528 is beyond EOD, truncated [ 560.506639] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x210ff, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) 12:21:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @dev, {[@noop]}}}}}) 12:21:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x1b0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0xec0, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000003c40)=[{{&(0x7f0000000000)={0xa, 0x4e21, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x10000}}, @tclass={{0x14}}], 0x30}}], 0x1, 0x0) 12:21:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 12:21:27 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000580)='./file0/file0\x00', 0x0) 12:21:27 executing program 5: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000180)=""/114) [ 560.730941] 8021q: adding VLAN 0 to HW filter on device bond54 [ 560.769089] bond0: Enslaving bond54 as an active interface with an up link 12:21:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x5, 0x0, &(0x7f0000000100)) [ 560.787094] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 560.792973] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x1e0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000004940)={0x4, 0x0, 0x0, 0x0, 0x428}, 0x40) 12:21:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5411, &(0x7f00000000c0)={'wg0\x00'}) [ 560.848965] loop4: p2 start 420544512 is beyond EOD, truncated [ 560.878992] loop4: p3 start 2114410187 is beyond EOD, truncated [ 560.912284] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 560.942991] loop4: p6 start 3496214528 is beyond EOD, truncated [ 560.972009] loop4: p7 start 1581527914 is beyond EOD, truncated [ 561.000138] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 561.008176] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 561.040208] loop4: p2 start 420544512 is beyond EOD, truncated [ 561.056322] loop4: p3 start 2114410187 is beyond EOD, truncated [ 561.073354] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 561.093533] loop4: p6 start 3496214528 is beyond EOD, truncated [ 561.103395] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x40000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000015c0)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @private2}, 0x1c, 0x0}}], 0x2, 0x0) 12:21:27 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x0, 0x0, 0x7ff}, 0x40) 12:21:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x33fe0, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x1f2, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:27 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'security.', '\x00'}, 0x0, 0x0, 0x0) 12:21:27 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, 0x0, 0x0) 12:21:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x12, 0x0, 0x0, 0x1}, 0x40) [ 561.356618] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 561.371317] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x201, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 561.418683] loop4: p2 start 420544512 is beyond EOD, truncated [ 561.440232] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x88, 0x23, 0x0, 0x0) [ 561.464795] 8021q: adding VLAN 0 to HW filter on device bond55 12:21:28 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 561.497085] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 561.507828] bond0: Enslaving bond55 as an active interface with an up link 12:21:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000003600)=[{{&(0x7f0000000080)=@in6={0xa, 0x4e21, 0x0, @local, 0x9}, 0x80, 0x0}}], 0x1, 0x8001) [ 561.542106] loop4: p6 start 3496214528 is beyond EOD, truncated [ 561.575905] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xfffff, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:28 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000100)={0x52, ""/82}) 12:21:28 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000040)={'raw\x00', 0x4, "7cc35450"}, &(0x7f0000000180)=0x28) 12:21:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20000520, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x218, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:28 executing program 5: bpf$BPF_PROG_DETACH(0xc, &(0x7f00000000c0)={@cgroup, 0xffffffffffffffff, 0x11}, 0x10) 12:21:28 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x40002) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) [ 562.334078] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 562.347349] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:28 executing program 5: syz_mount_image$msdos(0x0, &(0x7f0000001540)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000480)='/dev/loop0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='fuseblk\x00', 0x0, 0x0) 12:21:28 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.redirect\x00') [ 562.393100] loop4: p2 start 420544512 is beyond EOD, truncated [ 562.417031] loop4: p3 start 2114410187 is beyond EOD, truncated [ 562.427152] 8021q: adding VLAN 0 to HW filter on device bond56 12:21:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x284, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 562.450936] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 562.470004] bond0: Enslaving bond56 as an active interface with an up link [ 562.495233] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000001300)={'batadv_slave_1\x00', @ifru_mtu}) 12:21:29 executing program 5: bpf$BPF_PROG_DETACH(0x10, 0x0, 0x0) [ 562.539582] loop4: p7 start 1581527914 is beyond EOD, truncated [ 562.679404] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 562.686282] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 562.723459] loop4: p2 start 420544512 is beyond EOD, truncated [ 562.737607] loop4: p3 start 2114410187 is beyond EOD, truncated [ 562.753067] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 562.771185] loop4: p6 start 3496214528 is beyond EOD, truncated [ 562.784126] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x100000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) 12:21:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip6={{0xb, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_SPORT={0x6}]}}}]}, 0x3c}}, 0x0) 12:21:29 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 12:21:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x7ffff000, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x2d0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x7, 0x2, 0x4}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000030c0)={r0, 0x0, 0x0}, 0x20) 12:21:29 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, 0x0, 0x7) [ 563.064416] nla_parse: 6 callbacks suppressed [ 563.064427] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 563.082928] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 563.093021] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:29 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@huge_never='huge=never'}], [{@uid_eq={'uid', 0x3d, 0xee00}}]}) 12:21:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10}, 0x40) [ 563.118882] loop4: p2 start 420544512 is beyond EOD, truncated [ 563.145056] loop4: p3 start 2114410187 is beyond EOD, truncated [ 563.200276] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 563.213579] tmpfs: Bad value '00000000000000060928' for mount option 'uid' [ 563.222986] loop4: p6 start 3496214528 is beyond EOD, truncated [ 563.241231] 8021q: adding VLAN 0 to HW filter on device bond57 12:21:29 executing program 5: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000180)=""/166, 0xa6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x89) 12:21:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x17, 0x0, &(0x7f0000000100)) [ 563.241852] tmpfs: Bad value '00000000000000060928' for mount option 'uid' [ 563.262839] bond0: Enslaving bond57 as an active interface with an up link [ 563.273317] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x2d8, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 563.307521] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 563.427189] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 563.441719] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 563.467088] loop4: p2 start 420544512 is beyond EOD, truncated [ 563.479903] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x1000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0xf, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'tunl0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local, {[@timestamp_addr={0x44, 0x4}]}}}}}) 12:21:30 executing program 2: bpf$BPF_PROG_DETACH(0x1a, 0x0, 0x0) 12:21:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x300, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 563.532932] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 563.550399] loop4: p6 start 3496214528 is beyond EOD, truncated [ 563.559027] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x7, 0x2, 0xc5, 0x0, 0xffffffffffffffff, 0x0, [0x2e]}, 0x40) 12:21:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x630, 0x1}, 0x40) [ 563.664076] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x3bc, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:30 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) futimesat(r0, 0x0, &(0x7f0000000b40)) [ 563.770366] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=18444 comm=syz-executor.1 [ 563.794003] 8021q: adding VLAN 0 to HW filter on device bond58 [ 563.812330] bond0: Enslaving bond58 as an active interface with an up link 12:21:30 executing program 5: syz_emit_ethernet(0x5e, &(0x7f0000000a80)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "65db01", 0x28, 0x2c, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50]}, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x2, 0x2, 0x0, 0xff]}, @mcast2={0xff, 0x2, [0x0, 0x50]}}}}}}}, 0x0) [ 563.826836] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 563.832716] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 563.853727] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 563.854149] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:30 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c02) 12:21:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x10, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 563.916760] loop4: p3 start 2114410187 is beyond EOD, truncated [ 563.958275] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 563.988710] loop4: p6 start 3496214528 is beyond EOD, truncated [ 564.010081] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 564.012029] loop4: p7 start 1581527914 is beyond EOD, truncated [ 564.034428] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 564.045530] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 564.070899] loop4: p2 start 420544512 is beyond EOD, truncated [ 564.085321] 8021q: adding VLAN 0 to HW filter on device bond59 [ 564.094737] loop4: p3 start 2114410187 is beyond EOD, truncated [ 564.107510] bond0: Enslaving bond59 as an active interface with an up link [ 564.123453] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 564.139687] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 564.140296] loop4: p6 start 3496214528 is beyond EOD, truncated [ 564.165110] loop4: p7 start 1581527914 is beyond EOD, truncated [ 564.276431] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 564.282323] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 564.308875] loop4: p2 start 420544512 is beyond EOD, truncated [ 564.339114] loop4: p3 start 2114410187 is beyond EOD, truncated [ 564.359476] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 564.382691] loop4: p6 start 3496214528 is beyond EOD, truncated [ 564.401195] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x2000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:31 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x9, r0, 0xfffffffffffffffc) 12:21:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x2276, 0x0) 12:21:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x3f4, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x25, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 564.622485] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x4) 12:21:31 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0xe0657b214fd21b70}, 0x10) [ 564.715417] 8021q: adding VLAN 0 to HW filter on device bond60 [ 564.723055] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 564.737984] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 564.754851] bond0: Enslaving bond60 as an active interface with an up link 12:21:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f0000000000)=0x10001, 0x4) 12:21:31 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000003800)='/dev/full\x00', 0x0, 0x0) write$nbd(r0, 0x0, 0x0) [ 564.772318] loop4: p2 start 420544512 is beyond EOD, truncated [ 564.798942] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 564.810868] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x3f8, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 564.855644] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:31 executing program 5: syz_mount_image$tmpfs(&(0x7f0000002340)='tmpfs\x00', &(0x7f0000002380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002980)={[{@nr_blocks={'nr_blocks', 0x3d, [0x55]}}]}) 12:21:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) [ 564.898977] loop4: p6 start 3496214528 is beyond EOD, truncated [ 564.927163] loop4: p7 start 1581527914 is beyond EOD, truncated [ 564.964273] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 564.975324] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 564.989588] tmpfs: Bad value 'U' for mount option 'nr_blocks' [ 565.000423] loop4: p2 start 420544512 is beyond EOD, truncated [ 565.023732] tmpfs: Bad value 'U' for mount option 'nr_blocks' [ 565.024600] loop4: p3 start 2114410187 is beyond EOD, truncated [ 565.057686] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 565.081769] loop4: p6 start 3496214528 is beyond EOD, truncated [ 565.108557] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x3000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x2, 0x0, &(0x7f0000000100)) 12:21:31 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xb0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffff9c, &(0x7f00000001c0)='/dev/nvram\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 12:21:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x67, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xa00, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:32 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000002fc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001180)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}], 0x1, 0x0) 12:21:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000200)={'ip6gre0\x00', 0x0}) [ 565.468639] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 565.486230] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 565.491902] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 565.539194] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x10, 0x0, &(0x7f0000000100)) [ 565.580331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pid=18689 comm=syz-executor.1 [ 565.586434] loop4: p3 start 2114410187 is beyond EOD, truncated [ 565.609555] 8021q: adding VLAN 0 to HW filter on device bond61 [ 565.631581] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 565.654297] bond0: Enslaving bond61 as an active interface with an up link [ 565.660623] loop4: p6 start 3496214528 is beyond EOD, truncated [ 565.683028] loop4: p7 start 1581527914 is beyond EOD, truncated [ 565.703372] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 565.707095] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 12:21:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x1801, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x46, 0x0, &(0x7f0000000100)) 12:21:32 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x5e, &(0x7f0000000a80)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "65db00", 0x28, 0x2c, 0xff, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50]}, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x2, 0x2, 0x0, 0xff]}, @mcast2={0xff, 0x2, [0x0, 0x50]}}}}}}}, 0x0) [ 565.734638] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 565.738660] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pid=18704 comm=syz-executor.1 [ 565.754072] loop4: p2 start 420544512 is beyond EOD, truncated [ 565.775651] loop4: p3 start 2114410187 is beyond EOD, truncated [ 565.791748] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x4011, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 565.826520] loop4: p6 start 3496214528 is beyond EOD, truncated [ 565.861292] loop4: p7 start 1581527914 is beyond EOD, truncated [ 565.972537] 8021q: adding VLAN 0 to HW filter on device bond62 [ 565.980441] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 565.986338] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 566.011079] loop4: p2 start 420544512 is beyond EOD, truncated [ 566.021586] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16401 sclass=netlink_route_socket pid=18720 comm=syz-executor.1 [ 566.023195] bond0: Enslaving bond62 as an active interface with an up link [ 566.058831] loop4: p3 start 2114410187 is beyond EOD, truncated [ 566.080283] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 566.112006] loop4: p6 start 3496214528 is beyond EOD, truncated [ 566.118908] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x4000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:32 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 12:21:32 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @generic={0x0, "8e9e8b16378819f5bdd7ed48739b"}, @isdn, @xdp={0x2c, 0x0, 0x0, 0x1a}}) 12:21:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x1802, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 566.151667] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 566.158590] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 566.165795] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16401 sclass=netlink_route_socket pid=18776 comm=syz-executor.1 [ 566.167150] loop4: p2 start 420544512 is beyond EOD, truncated [ 566.223946] loop4: p3 start 2114410187 is beyond EOD, truncated [ 566.242607] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:32 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0xc0481273, 0x0) [ 566.270332] loop4: p6 start 3496214528 is beyond EOD, truncated [ 566.289904] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:32 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x5e, &(0x7f0000000a80)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "65db01", 0x28, 0x2c, 0xff, @remote={0xfe, 0x80, [0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50]}, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x2, 0x2, 0x0, 0xff]}, @mcast2={0xff, 0x2, [0x0, 0x50]}}}}}}}, 0x0) 12:21:33 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x5e, &(0x7f0000000a80)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "65db01", 0x28, 0x2c, 0xff, @remote={0xfe, 0x80, [0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50]}, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x2, 0x2, 0x0, 0xff]}, @mcast2={0xff, 0x2, [0x0, 0x50]}}}}}}}, 0x0) 12:21:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000040)={0xffffffff, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) 12:21:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x2000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x410, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) [ 566.549285] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 566.584074] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) [ 566.660767] loop4: p2 start 420544512 is beyond EOD, truncated [ 566.728027] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x3f00, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 566.771846] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 566.843853] loop4: p6 start 3496214528 is beyond EOD, truncated [ 566.894148] 8021q: adding VLAN 0 to HW filter on device bond63 [ 566.910528] loop4: p7 start 1581527914 is beyond EOD, truncated [ 566.931953] bond0: Enslaving bond63 as an active interface with an up link [ 567.116713] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 567.131622] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 567.167396] loop4: p2 start 420544512 is beyond EOD, truncated [ 567.174522] loop4: p3 start 2114410187 is beyond EOD, truncated [ 567.216078] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 567.239278] loop4: p6 start 3496214528 is beyond EOD, truncated [ 567.261332] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x5000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:33 executing program 2: bpf$BPF_PROG_DETACH(0xa, 0x0, 0x0) 12:21:33 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x5e, &(0x7f0000000a80)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "65db01", 0x28, 0x2c, 0xff, @remote={0xfe, 0x80, [0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50]}, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x2, 0x2, 0x0, 0xff]}, @mcast2={0xff, 0x2, [0x0, 0x50]}}}}}}}, 0x0) 12:21:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x4000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x425, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:34 executing program 2: renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x0) 12:21:34 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000140)) [ 567.574802] 8021q: adding VLAN 0 to HW filter on device bond64 [ 567.591824] bond0: Enslaving bond64 as an active interface with an up link [ 567.593330] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 12:21:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x5c00, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:34 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x3e, 0x0, &(0x7f0000000100)) [ 567.623492] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 567.647901] loop4: p2 start 420544512 is beyond EOD, truncated [ 567.664543] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000440)={@ipv4={[], [], @dev}}) 12:21:34 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000001540)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000480)='/dev/loop0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='fuseblk\x00', 0x0, &(0x7f00000008c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id'}}) [ 567.690440] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 567.728715] loop4: p6 start 3496214528 is beyond EOD, truncated [ 567.750206] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f00000000c0)='./bus\x00', 0x0) [ 567.850673] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 567.860835] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 567.902477] loop4: p2 start 420544512 is beyond EOD, truncated [ 567.923946] loop4: p3 start 2114410187 is beyond EOD, truncated [ 567.951542] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 567.999824] loop4: p6 start 3496214528 is beyond EOD, truncated [ 568.041806] loop4: p7 start 1581527914 is beyond EOD, truncated [ 568.062830] bond0: Releasing backup interface bond64 [ 568.074521] bond64 (unregistering): Released all slaves 12:21:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x6000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:34 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8982, &(0x7f00000000c0)={'wg0\x00'}) 12:21:34 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000300)={0x5, 0x41, "02b38a74d13931090250387f9091c080f2e85fc2b698b44bc70b2787b32fd2e8a946193159f1447ca9c5e6b210c9563f1ed2ebfbc3edf83c01f370c4629110ffbb"}) 12:21:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x8402, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 568.172538] nla_parse: 5 callbacks suppressed [ 568.172550] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 568.323449] 8021q: adding VLAN 0 to HW filter on device bond64 [ 568.344342] bond0: Enslaving bond64 as an active interface with an up link [ 568.366644] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 568.382307] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 568.412824] loop4: p2 start 420544512 is beyond EOD, truncated [ 568.432802] loop4: p3 start 2114410187 is beyond EOD, truncated [ 568.462013] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 568.479502] loop4: p6 start 3496214528 is beyond EOD, truncated [ 568.512942] loop4: p7 start 1581527914 is beyond EOD, truncated [ 568.834456] bond0: Releasing backup interface bond64 [ 568.849219] bond64 (unregistering): Released all slaves 12:21:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002740)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @private}}, 0x1c, 0x0}}], 0x4, 0x0) 12:21:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000000)=0x4000, 0x4) 12:21:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xb001, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x7000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) 12:21:35 executing program 2: syz_mount_image$tmpfs(&(0x7f00000001c0)='tmpfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@mpol={'mpol', 0x3d, {'interleave', '', @val={0x3a, [0x2d, 0x2c, 0x39]}}}}]}) [ 569.014405] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000000), 0x4) [ 569.129972] 8021q: adding VLAN 0 to HW filter on device bond64 [ 569.145500] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 569.151404] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 569.167261] bond0: Enslaving bond64 as an active interface with an up link [ 569.184876] loop4: p2 start 420544512 is beyond EOD, truncated [ 569.186017] tmpfs: Bad value 'interleave:-,9' for mount option 'mpol' [ 569.223795] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x1e, 0x0, &(0x7f0000000100)) 12:21:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xbc03, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 569.251993] tmpfs: Bad value 'interleave:-,9' for mount option 'mpol' [ 569.258298] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 569.290689] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000015c0)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e23, 0x0, @private2}, 0x1c, 0x0}}], 0x2, 0x0) 12:21:35 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x5e, &(0x7f0000000a80)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "65db01", 0x28, 0x2c, 0xff, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50]}, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x2, 0x2, 0x0, 0xff]}, @mcast2={0xff, 0x2, [0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}}}}}, 0x0) [ 569.318141] loop4: p7 start 1581527914 is beyond EOD, truncated [ 569.469784] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 569.496581] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'f'}]}}, &(0x7f0000000100)=""/131, 0x2a, 0x83, 0x1}, 0x20) [ 569.542011] loop4: p2 start 420544512 is beyond EOD, truncated [ 569.588192] loop4: p3 start 2114410187 is beyond EOD, truncated [ 569.631051] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 569.680165] loop4: p6 start 3496214528 is beyond EOD, truncated [ 569.728953] loop4: p7 start 1581527914 is beyond EOD, truncated [ 569.849364] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 569.859029] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 569.870173] bond0: Releasing backup interface bond64 [ 569.880801] loop4: p2 start 420544512 is beyond EOD, truncated [ 569.893867] bond64 (unregistering): Released all slaves [ 569.899675] loop4: p3 start 2114410187 is beyond EOD, truncated [ 569.921018] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 569.929991] loop4: p6 start 3496214528 is beyond EOD, [ 569.935654] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x2, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:36 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000080)) 12:21:36 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x5e, &(0x7f0000000a80)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "65db01", 0x28, 0x2c, 0xff, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50]}, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x2, 0x2, 0x0, 0xff]}, @mcast2={0xff, 0x2, [0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}}}}}}, 0x0) 12:21:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x9000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 569.953941] truncated [ 569.959987] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xd002, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:36 executing program 5: sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0x3bb672f0bdb9fb7c) 12:21:36 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000400)={'trans=unix,', {[], [{@smackfshat={'smackfshat', 0x3d, 'nodots'}}]}}) [ 570.077170] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:36 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x5d9fda2f}, 0x40) 12:21:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xd802, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 570.176827] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 570.189863] 8021q: adding VLAN 0 to HW filter on device bond64 [ 570.195160] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 570.217221] bond0: Enslaving bond64 as an active interface with an up link [ 570.225363] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:36 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chown(&(0x7f0000000500)='./file0\x00', 0x0, 0xffffffffffffffff) 12:21:36 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000003c0)="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", 0xd00}, {0x0}, {&(0x7f00000014c0)="06", 0x1}], 0x3}}], 0x1, 0x4840) [ 570.254857] loop4: p3 start 2114410187 is beyond EOD, truncated [ 570.297746] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 570.330835] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x3, 0x0, &(0x7f0000000100)) [ 570.361410] loop4: p7 start 1581527914 is beyond EOD, truncated [ 570.495240] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 570.501178] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 570.525983] loop4: p2 start 420544512 is beyond EOD, truncated [ 570.545702] loop4: p3 start 2114410187 is beyond EOD, truncated [ 570.571882] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 570.600857] loop4: p6 start 3496214528 is beyond EOD, truncated [ 570.624697] loop4: p7 start 1581527914 is beyond EOD, truncated [ 570.724678] bond0: Releasing backup interface bond64 [ 570.750645] bond64 (unregistering): Released all slaves [ 570.812186] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 570.881585] print_req_error: 78 callbacks suppressed [ 570.881594] print_req_error: I/O error, dev loop4, sector 264051 [ 570.881690] print_req_error: I/O error, dev loop4, sector 2830 [ 570.899955] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 570.906386] buffer_io_error: 60 callbacks suppressed [ 570.906396] Buffer I/O error on dev loop4p4, logical block 1, async page read [ 570.915914] print_req_error: I/O error, dev loop4, sector 28674 [ 570.935405] print_req_error: I/O error, dev loop4, sector 264064 [ 570.975924] print_req_error: I/O error, dev loop4, sector 28674 [ 570.982023] Buffer I/O error on dev loop4p8, logical block 1, async page read [ 570.993895] print_req_error: I/O error, dev loop4, sector 264051 [ 571.000131] Buffer I/O error on dev loop4p1, logical block 263552, async page read [ 571.008283] print_req_error: I/O error, dev loop4, sector 264052 [ 571.014482] Buffer I/O error on dev loop4p1, logical block 263553, async page read [ 571.022624] print_req_error: I/O error, dev loop4, sector 264053 [ 571.029238] Buffer I/O error on dev loop4p1, logical block 263554, async page read [ 571.039673] print_req_error: I/O error, dev loop4, sector 264064 [ 571.045951] Buffer I/O error on dev loop4p5, logical block 33008, async page read [ 571.055664] print_req_error: I/O error, dev loop4, sector 264054 [ 571.062820] Buffer I/O error on dev loop4p1, logical block 263555, async page read [ 571.075669] Buffer I/O error on dev loop4p1, logical block 263556, async page read [ 571.083497] Buffer I/O error on dev loop4p1, logical block 263557, async page read [ 571.091451] Buffer I/O error on dev loop4p1, logical block 263558, async page read [ 571.107088] 8021q: adding VLAN 0 to HW filter on device bond64 [ 571.114739] bond0: Enslaving bond64 as an active interface with an up link [ 571.757348] bond0: Releasing backup interface bond64 [ 571.802192] bond64 (unregistering): Released all slaves 12:21:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x3, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x0, 0x3}, 0x40) 12:21:38 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x227b, 0x0) 12:21:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0xa000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xe001, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 572.011879] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:38 executing program 2: bpf$BPF_PROG_DETACH(0x3, 0x0, 0x0) 12:21:38 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000180)='tmpfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@gid={'gid'}}, {@mpol={'mpol', 0x3d, {'local', '=relative', @void}}}]}) [ 572.149848] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 572.157780] 8021q: adding VLAN 0 to HW filter on device bond64 [ 572.181500] bond0: Enslaving bond64 as an active interface with an up link [ 572.188273] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:38 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(&(0x7f0000000300)='/dev/loop0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuseblk\x00', 0x0, &(0x7f00000003c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize'}}]}}) [ 572.212123] tmpfs: Bad value 'local=relative' for mount option 'mpol' [ 572.244860] loop4: p2 start 420544512 is beyond EOD, truncated [ 572.250867] tmpfs: Bad value 'local=relative' for mount option 'mpol' 12:21:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1b, 0x7}, 0x40) [ 572.299561] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:38 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/bsg\x00', 0x535e02, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000240)='NLBL_CALIPSO\x00') write$cgroup_type(r0, &(0x7f0000000400)='threaded\x00', 0x9) [ 572.341617] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 572.374968] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:39 executing program 5: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_emit_ethernet(0x5e, &(0x7f0000000a80)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "65db01", 0x28, 0x2c, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50]}, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x2, 0x2, 0x0, 0xff]}, @mcast2={0xff, 0x2, [0x0, 0x50]}}}}}}}, 0x0) [ 572.406041] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:39 executing program 2: futex(0x0, 0x8c, 0x0, 0x0, &(0x7f0000000180), 0x0) [ 572.828901] bond0: Releasing backup interface bond64 [ 572.871457] bond64 (unregistering): Released all slaves [ 572.949348] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x4, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:39 executing program 5: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fuseblk\x00', 0x0, 0x0) 12:21:39 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_rdma(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=rdma,', {'port'}, 0x2c, {[{@common=@msize={'msize', 0x3d, 0xdb19}}]}}) 12:21:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xf201, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x10000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 573.088991] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x88, 0x1, &(0x7f0000000000)=0x4000, 0x4) 12:21:39 executing program 5: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000280)=0x2) [ 573.195106] 8021q: adding VLAN 0 to HW filter on device bond64 [ 573.211036] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 573.232112] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x48, 0x0, &(0x7f0000000100)) 12:21:39 executing program 2: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000140)) [ 573.249123] bond0: Enslaving bond64 as an active interface with an up link [ 573.278390] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000000), 0x4) [ 573.320577] loop4: p3 start 2114410187 is beyond EOD, truncated [ 573.352936] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:39 executing program 2: syz_mount_image$vfat(&(0x7f00000012c0)='vfat\x00', &(0x7f0000001300)='./file0\x00', 0x0, 0x0, &(0x7f0000002440), 0x0, &(0x7f0000002480)={[{@numtail='nonumtail=0'}, {@fat=@nocase='nocase'}, {@shortname_win95='shortname=win95'}]}) [ 573.391506] loop4: p6 start 3496214528 is beyond EOD, truncated [ 573.421047] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:40 executing program 5: clock_gettime(0xee13b8c95a26eb0d, 0x0) [ 573.453500] FAT-fs (loop2): bogus number of reserved sectors [ 573.495732] FAT-fs (loop2): Can't find a valid FAT filesystem [ 573.574101] FAT-fs (loop2): bogus number of reserved sectors [ 573.581516] FAT-fs (loop2): Can't find a valid FAT filesystem [ 573.920238] bond0: Releasing backup interface bond64 [ 573.964219] bond64 (unregistering): Released all slaves [ 574.045774] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x6, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000000)=0xffffffffffffffe3) 12:21:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) pselect6(0x40, &(0x7f0000000040)={0x8}, 0x0, 0x0, &(0x7f0000000100), 0x0) 12:21:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x10ba4f8b, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xf403, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:40 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x21044, 0x0) [ 574.178468] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:40 executing program 5: r0 = fanotify_init(0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 12:21:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$ethtool(0x0) prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000fff000/0x1000)=nil) [ 574.272181] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 574.296403] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xf803, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x81080004}) [ 574.317216] loop4: p2 start 420544512 is beyond EOD, truncated [ 574.338198] 8021q: adding VLAN 0 to HW filter on device bond64 [ 574.358612] bond0: Enslaving bond64 as an active interface with an up link [ 574.365804] loop4: p3 start 2114410187 is beyond EOD, truncated [ 574.398180] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 574.428072] loop4: p6 start 3496214528 is beyond EOD, truncated [ 574.444280] loop4: p7 start 1581527914 is beyond EOD, truncated [ 574.559417] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 574.565835] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 574.589331] loop4: p2 start 420544512 is beyond EOD, truncated [ 574.603730] loop4: p3 start 2114410187 is beyond EOD, truncated [ 574.622815] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 574.638945] loop4: p6 start 3496214528 is beyond EOD, truncated [ 574.654316] loop4: p7 start 1581527914 is beyond EOD, truncated [ 574.870746] bond0: Releasing backup interface bond64 [ 574.906193] bond64 (unregistering): Released all slaves 12:21:41 executing program 5: fanotify_init(0x64, 0x0) 12:21:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x18010000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 574.964137] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x8, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x3a, 0x0, &(0x7f0000000100)) 12:21:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00'}, 0x10) 12:21:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xff00, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 575.064084] 8021q: adding VLAN 0 to HW filter on device bond64 [ 575.074945] bond0: Enslaving bond64 as an active interface with an up link 12:21:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x1f, 0x0, 0x0) 12:21:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002740)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @private}}, 0x1c, 0x0, 0x0, &(0x7f0000000780)=[@flowinfo={{0x14}}, @dontfrag={{0x14}}], 0x30}}], 0x1, 0x8800) [ 575.174115] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 575.228580] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 575.264615] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:41 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002740)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @private}}, 0x1c, 0x0}}], 0x1, 0x1c) 12:21:41 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000080)) [ 575.323743] 8021q: adding VLAN 0 to HW filter on device bond65 [ 575.326413] loop4: p2 start 420544512 is beyond EOD, truncated [ 575.353326] loop4: p3 start 2114410187 is beyond EOD, truncated [ 575.358364] bond0: Enslaving bond65 as an active interface with an up link [ 575.374776] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:41 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@map, 0xffffffffffffffff, 0x19}, 0x10) [ 575.416924] loop4: p6 start 3496214528 is beyond EOD, truncated [ 575.424523] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:42 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000200)) 12:21:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8914, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x0, @dev}}) [ 575.591515] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 575.604755] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 575.633954] loop4: p2 start 420544512 is beyond EOD, truncated [ 575.666370] loop4: p3 start 2114410187 is beyond EOD, truncated [ 575.690636] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 575.722838] loop4: p6 start 3496214528 is beyond EOD, truncated [ 575.747351] loop4: p7 start 1581527914 is beyond EOD, truncated [ 575.845311] bond0: Releasing backup interface bond65 [ 575.863419] bond65 (unregistering): Released all slaves 12:21:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x18020000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 576.138750] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 576.148737] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 576.171299] loop4: p2 start 420544512 is beyond EOD, truncated [ 576.191049] loop4: p3 start 2114410187 is beyond EOD, truncated [ 576.212830] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 576.234749] loop4: p6 start 3496214528 is beyond EOD, truncated [ 576.253279] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0xa, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:42 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000500)={0x0, 0x0, 0xffffffbb}) 12:21:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x40000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 576.372778] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000000), 0x4) [ 576.463011] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 576.478048] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 576.514671] loop4: p2 start 420544512 is beyond EOD, truncated [ 576.514879] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x541b, &(0x7f00000000c0)={'wg0\x00'}) 12:21:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x15, &(0x7f0000000000), 0x4) [ 576.556454] loop4: p3 start 2114410187 is beyond EOD, truncated [ 576.606135] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:43 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_out(r0, 0x12fb, 0x0) [ 576.649553] loop4: p6 start 3496214528 is beyond EOD, truncated [ 576.668507] loop4: p7 start 1581527914 is beyond EOD, truncated [ 576.687799] 8021q: adding VLAN 0 to HW filter on device bond65 12:21:43 executing program 5: 12:21:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x19030000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 576.699571] bond0: Enslaving bond65 as an active interface with an up link 12:21:43 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x100000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:43 executing program 5: 12:21:43 executing program 5: [ 576.955164] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 576.960775] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 576.992937] loop4: p2 start 420544512 is beyond EOD, truncated [ 577.007949] loop4: p3 start 2114410187 is beyond EOD, truncated [ 577.034754] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 577.071232] loop4: p6 start 3496214528 is beyond EOD, truncated [ 577.113644] loop4: p7 start 1581527914 is beyond EOD, truncated [ 577.477555] bond0: Releasing backup interface bond65 [ 577.497882] bond65 (unregistering): Released all slaves [ 577.558766] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 577.595006] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 577.600899] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0xc, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:44 executing program 2: 12:21:44 executing program 5: [ 577.662966] loop4: p2 start 420544512 is beyond EOD, truncated [ 577.676936] loop4: p3 start 2114410187 is beyond EOD, truncated [ 577.704214] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 577.742161] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x1fffff, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:44 executing program 5: 12:21:44 executing program 2: [ 577.755181] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 577.779515] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:44 executing program 5: 12:21:44 executing program 2: 12:21:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x19f30100, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:44 executing program 5: 12:21:44 executing program 2: [ 577.931730] 8021q: adding VLAN 0 to HW filter on device bond65 [ 577.963261] bond0: Enslaving bond65 as an active interface with an up link 12:21:44 executing program 5: [ 578.105152] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 578.114291] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 578.158489] loop4: p2 start 420544512 is beyond EOD, truncated [ 578.179401] loop4: p3 start 2114410187 is beyond EOD, truncated [ 578.202870] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 578.230889] loop4: p6 start 3496214528 is beyond EOD, truncated [ 578.239445] loop4: p7 start 1581527914 is beyond EOD, truncated [ 578.263544] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 578.277160] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 578.299314] loop4: p2 start 420544512 is beyond EOD, truncated [ 578.305375] bond0: Releasing backup interface bond65 [ 578.313228] bond65 (unregistering): Released all slaves [ 578.315462] loop4: p3 start 2114410187 is beyond EOD, truncated [ 578.326837] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 578.337572] loop4: p6 start 3496214528 is beyond EOD, truncated [ 578.347423] loop4: p7 start 1581527914 is beyond EOD, truncated [ 578.394411] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 578.431838] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 578.441792] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 578.449322] bond65 (unregistering): Released all slaves [ 578.457446] loop4: p2 start 420544512 is beyond EOD, truncated [ 578.472534] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0xe, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:45 executing program 2: 12:21:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x1000000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:45 executing program 5: [ 578.489945] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 578.513314] loop4: p6 start 3496214528 is beyond EOD, truncated [ 578.534710] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:45 executing program 5: 12:21:45 executing program 2: 12:21:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x1c000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) [ 578.644715] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 578.653579] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 12:21:45 executing program 5: 12:21:45 executing program 2: [ 578.691775] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 578.716041] 8021q: adding VLAN 0 to HW filter on device bond65 [ 578.723657] bond0: Enslaving bond65 as an active interface with an up link [ 578.733331] loop4: p2 start 420544512 is beyond EOD, truncated 12:21:45 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x2000000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 578.763388] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:45 executing program 5: 12:21:45 executing program 2: [ 578.803586] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 578.829897] loop4: p6 start 3496214528 is beyond EOD, truncated [ 578.860646] loop4: p7 start 1581527914 is beyond EOD, truncated [ 579.085622] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 579.091296] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 579.111084] loop4: p2 start 420544512 is beyond EOD, truncated [ 579.120193] bond0: Releasing backup interface bond65 [ 579.125813] loop4: p3 start 2114410187 is beyond EOD, truncated [ 579.136254] bond65 (unregistering): Released all slaves [ 579.143114] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 579.173073] loop4: p6 start 3496214528 is beyond EOD, truncated [ 579.194037] loop4: p7 start 1581527914 is beyond EOD, truncated [ 579.224807] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 579.294486] 8021q: adding VLAN 0 to HW filter on device bond65 [ 579.320483] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 579.329956] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 579.352159] bond0: Enslaving bond65 as an active interface with an up link [ 579.375074] loop4: p2 start 420544512 is beyond EOD, truncated [ 579.388194] loop4: p3 start 2114410187 is beyond EOD, truncated [ 579.407356] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 579.425130] loop4: p6 start 3496214528 is beyond EOD, truncated [ 579.431236] loop4: p7 start 1581527914 is beyond EOD, truncated [ 579.531738] print_req_error: 123 callbacks suppressed [ 579.531747] print_req_error: I/O error, dev loop4, sector 264051 [ 579.548153] print_req_error: I/O error, dev loop4, sector 2830 [ 579.554275] print_req_error: I/O error, dev loop4, sector 2830 [ 579.560309] buffer_io_error: 89 callbacks suppressed [ 579.560322] Buffer I/O error on dev loop4p4, logical block 1, async page read [ 579.578688] print_req_error: I/O error, dev loop4, sector 28674 [ 579.579091] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 579.586927] print_req_error: I/O error, dev loop4, sector 264064 [ 579.608308] print_req_error: I/O error, dev loop4, sector 264051 [ 579.614474] Buffer I/O error on dev loop4p1, logical block 263552, async page read [ 579.622569] print_req_error: I/O error, dev loop4, sector 264052 [ 579.628803] Buffer I/O error on dev loop4p1, logical block 263553, async page read [ 579.636866] print_req_error: I/O error, dev loop4, sector 264053 [ 579.643023] Buffer I/O error on dev loop4p1, logical block 263554, async page read [ 579.651000] print_req_error: I/O error, dev loop4, sector 264054 [ 579.657254] Buffer I/O error on dev loop4p1, logical block 263555, async page read [ 579.665066] print_req_error: I/O error, dev loop4, sector 264055 [ 579.671241] Buffer I/O error on dev loop4p1, logical block 263556, async page read [ 579.679128] Buffer I/O error on dev loop4p1, logical block 263557, async page read [ 579.686926] Buffer I/O error on dev loop4p1, logical block 263558, async page read [ 579.694760] Buffer I/O error on dev loop4p1, logical block 263559, async page read [ 579.702525] Buffer I/O error on dev loop4p5, logical block 33008, async page read [ 579.817538] bond0: Releasing backup interface bond65 [ 579.842530] bond65 (unregistering): Released all slaves 12:21:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x10, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:46 executing program 2: 12:21:46 executing program 5: 12:21:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x2010000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x1f000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:46 executing program 5: 12:21:46 executing program 2: [ 580.057262] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 580.094508] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 12:21:46 executing program 2: 12:21:46 executing program 5: [ 580.109289] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 580.143808] loop4: p2 start 420544512 is beyond EOD, truncated [ 580.181955] loop4: p3 start 2114410187 is beyond EOD, truncated [ 580.198113] 8021q: adding VLAN 0 to HW filter on device bond65 12:21:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x3000000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:46 executing program 2: 12:21:46 executing program 5: [ 580.231886] bond0: Enslaving bond65 as an active interface with an up link [ 580.240070] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 580.289090] loop4: p6 start 3496214528 is beyond EOD, truncated [ 580.322000] loop4: p7 start 1581527914 is beyond EOD, truncated [ 580.641138] bond0: Releasing backup interface bond65 [ 580.662345] bond65 (unregistering): Released all slaves [ 580.730073] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 580.840411] 8021q: adding VLAN 0 to HW filter on device bond65 [ 580.853063] bond0: Enslaving bond65 as an active interface with an up link [ 581.376214] bond0: Releasing backup interface bond65 [ 581.403864] bond65 (unregistering): Released all slaves 12:21:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x60, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:48 executing program 5: 12:21:48 executing program 2: 12:21:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x20000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xa000000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:48 executing program 5: 12:21:48 executing program 2: [ 581.616628] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 581.675361] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 581.696086] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:48 executing program 2: 12:21:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x18010000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 581.738717] loop4: p2 start 420544512 is beyond EOD, truncated [ 581.746626] 8021q: adding VLAN 0 to HW filter on device bond65 [ 581.754378] bond0: Enslaving bond65 as an active interface with an up link 12:21:48 executing program 5: [ 581.797071] loop4: p3 start 2114410187 is beyond EOD, truncated [ 581.817406] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 581.835064] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:48 executing program 2: [ 581.849195] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:48 executing program 5: [ 581.975641] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 581.992464] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 582.036664] loop4: p2 start 420544512 is beyond EOD, truncated [ 582.056522] loop4: p3 start 2114410187 is beyond EOD, truncated [ 582.087160] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 582.113952] loop4: p6 start 3496214528 is beyond EOD, truncated [ 582.151912] loop4: p7 start 1581527914 is beyond EOD, truncated [ 582.185821] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 582.193656] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 582.212434] loop4: p2 start 420544512 is beyond EOD, truncated [ 582.221772] bond0: Releasing backup interface bond65 [ 582.227343] loop4: p3 start 2114410187 is beyond EOD, truncated [ 582.236720] bond65 (unregistering): Released all slaves [ 582.243745] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 582.269325] loop4: p6 start 3496214528 is beyond EOD, truncated [ 582.283257] loop4: p7 start 1581527914 is beyond EOD, truncated [ 582.325906] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 582.408367] 8021q: adding VLAN 0 to HW filter on device bond65 [ 582.423965] bond0: Enslaving bond65 as an active interface with an up link [ 582.952569] bond0: Releasing backup interface bond65 [ 582.987548] bond65 (unregistering): Released all slaves 12:21:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0xf0, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:49 executing program 2: 12:21:49 executing program 5: 12:21:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x21f30100, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x18020000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:49 executing program 2: 12:21:49 executing program 5: [ 583.217672] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 583.228809] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 583.249052] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:49 executing program 5: [ 583.270642] loop4: p2 start 420544512 is beyond EOD, truncated [ 583.298429] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:49 executing program 2: [ 583.336927] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 583.368544] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:49 executing program 5: [ 583.385963] 8021q: adding VLAN 0 to HW filter on device bond65 12:21:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x20000000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 583.411782] bond0: Enslaving bond65 as an active interface with an up link [ 583.419953] loop4: p7 start 1581527914 is beyond EOD, truncated 12:21:50 executing program 5: [ 583.829163] bond0: Releasing backup interface bond65 [ 583.848622] bond65 (unregistering): Released all slaves [ 583.968350] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 584.048215] 8021q: adding VLAN 0 to HW filter on device bond65 [ 584.068303] bond0: Enslaving bond65 as an active interface with an up link 12:21:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x300, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:50 executing program 2: 12:21:50 executing program 5: 12:21:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x23000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x3f000000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:50 executing program 2: 12:21:50 executing program 5: [ 584.194085] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 584.295616] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 584.305132] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:50 executing program 5: 12:21:50 executing program 2: [ 584.351047] loop4: p2 start 420544512 is beyond EOD, truncated [ 584.368971] 8021q: adding VLAN 0 to HW filter on device bond66 12:21:51 executing program 2: [ 584.406990] loop4: p3 start 2114410187 is beyond EOD, truncated [ 584.416351] bond0: Enslaving bond66 as an active interface with an up link [ 584.443861] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:51 executing program 5: 12:21:51 executing program 2: [ 584.498402] loop4: p6 start 3496214528 is beyond EOD, truncated [ 584.530328] loop4: p7 start 1581527914 is beyond EOD, truncated [ 584.695338] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 584.701019] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 584.717923] loop4: p2 start 420544512 is beyond EOD, truncated [ 584.730768] loop4: p3 start 2114410187 is beyond EOD, truncated [ 584.747405] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 584.762037] loop4: p6 start 3496214528 is beyond EOD, truncated [ 584.771967] bond0: Releasing backup interface bond66 [ 584.776257] loop4: p7 start 1581527914 is beyond EOD, truncated [ 584.789635] bond66 (unregistering): Released all slaves [ 584.798033] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 584.803698] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 584.825769] loop4: p2 start 420544512 is beyond EOD, truncated [ 584.838851] loop4: p3 start 2114410187 is beyond EOD, truncated [ 584.850779] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 584.862537] loop4: p6 start 3496214528 is beyond EOD, truncated [ 584.872168] loop4: p7 start 1581527914 is beyond EOD, truncated [ 584.882842] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 584.993896] 8021q: adding VLAN 0 to HW filter on device bond66 [ 585.010933] bond0: Enslaving bond66 as an active interface with an up link 12:21:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x600, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:51 executing program 5: 12:21:51 executing program 2: 12:21:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x40000000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x3f000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:51 executing program 5: [ 585.174564] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:51 executing program 5: 12:21:51 executing program 2: [ 585.217155] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 585.232603] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 585.278744] loop4: p2 start 420544512 is beyond EOD, truncated [ 585.296246] 8021q: adding VLAN 0 to HW filter on device bond67 12:21:51 executing program 2: 12:21:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x5c000000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:51 executing program 5: [ 585.321020] bond0: Enslaving bond67 as an active interface with an up link [ 585.341879] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:51 executing program 5: [ 585.406272] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 585.457561] loop4: p6 start 3496214528 is beyond EOD, truncated [ 585.496991] loop4: p7 start 1581527914 is beyond EOD, truncated [ 585.706454] bond0: Releasing backup interface bond67 [ 585.733413] bond67 (unregistering): Released all slaves [ 585.832240] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0xa00, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:52 executing program 2: 12:21:52 executing program 5: [ 585.903793] 8021q: adding VLAN 0 to HW filter on device bond67 [ 585.928259] bond0: Enslaving bond67 as an active interface with an up link 12:21:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x40000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x84020000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:52 executing program 2: [ 586.071549] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:52 executing program 5: [ 586.127438] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 586.142356] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 586.180606] loop4: p2 start 420544512 is beyond EOD, truncated [ 586.182445] 8021q: adding VLAN 0 to HW filter on device bond68 [ 586.195394] bond0: Enslaving bond68 as an active interface with an up link [ 586.203257] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:52 executing program 2: 12:21:52 executing program 5: [ 586.226858] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xb0010000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:52 executing program 2: 12:21:52 executing program 5: [ 586.282176] loop4: p6 start 3496214528 is beyond EOD, truncated [ 586.321635] loop4: p7 start 1581527914 is beyond EOD, truncated [ 586.970535] bond0: Releasing backup interface bond68 [ 586.990990] bond68 (unregistering): Released all slaves [ 587.114590] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0xa39, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:53 executing program 2: 12:21:53 executing program 5: 12:21:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x48000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xbc030000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:53 executing program 2: 12:21:53 executing program 5: [ 587.264177] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:53 executing program 2: [ 587.378685] 8021q: adding VLAN 0 to HW filter on device bond68 [ 587.385008] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 587.390624] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 587.403605] bond0: Enslaving bond68 as an active interface with an up link 12:21:54 executing program 5: [ 587.426029] loop4: p2 start 420544512 is beyond EOD, truncated [ 587.441150] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:54 executing program 2: [ 587.495562] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:54 executing program 5: 12:21:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xd0020000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 587.545775] loop4: p6 start 3496214528 is beyond EOD, truncated [ 587.585585] loop4: p7 start 1581527914 is beyond EOD, truncated [ 587.952272] bond0: Releasing backup interface bond68 [ 587.984172] bond68 (unregistering): Released all slaves [ 588.035701] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 588.160195] 8021q: adding VLAN 0 to HW filter on device bond68 [ 588.180105] bond0: Enslaving bond68 as an active interface with an up link [ 588.589721] bond0: Releasing backup interface bond68 [ 588.597912] bond68 (unregistering): Released all slaves 12:21:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0xc00, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:55 executing program 2: 12:21:55 executing program 5: 12:21:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x4aca6150, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xd8020000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:55 executing program 5: 12:21:55 executing program 2: [ 588.762972] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 588.799114] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 588.810694] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 588.841452] loop4: p2 start 420544512 is beyond EOD, truncated [ 588.861793] 8021q: adding VLAN 0 to HW filter on device bond68 [ 588.880781] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:55 executing program 2: 12:21:55 executing program 5: 12:21:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xe0010000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 588.892794] bond0: Enslaving bond68 as an active interface with an up link [ 588.915060] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:21:55 executing program 2: 12:21:55 executing program 5: [ 588.963748] loop4: p6 start 3496214528 is beyond EOD, truncated [ 588.989052] loop4: p7 start 1581527914 is beyond EOD, truncated [ 589.144884] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 589.152195] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 589.192344] loop4: p2 start 420544512 is beyond EOD, truncated [ 589.209798] loop4: p3 start 2114410187 is beyond EOD, truncated [ 589.232339] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 589.249837] loop4: p6 start 3496214528 is beyond EOD, truncated [ 589.263992] loop4: p7 start 1581527914 is beyond EOD, truncated [ 589.282711] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 589.289852] bond0: Releasing backup interface bond68 [ 589.295306] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 589.306631] bond68 (unregistering): Released all slaves [ 589.312976] loop4: p2 start 420544512 is beyond EOD, truncated [ 589.321499] loop4: p3 start 2114410187 is beyond EOD, truncated [ 589.348782] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 589.359348] loop4: p6 start 3496214528 is beyond EOD, truncated [ 589.370951] loop4: p7 start 1581527914 is beyond EOD, truncated [ 589.392215] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 589.484163] 8021q: adding VLAN 0 to HW filter on device bond68 [ 589.495056] bond0: Enslaving bond68 as an active interface with an up link 12:21:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0xe00, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:56 executing program 2: 12:21:56 executing program 5: 12:21:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xf2010000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x4c000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:56 executing program 5: 12:21:56 executing program 2: [ 589.686850] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 589.700444] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 589.717691] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xf4030000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 589.747827] loop4: p2 start 420544512 is beyond EOD, truncated [ 589.771485] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:56 executing program 2: 12:21:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x1d, 0x0, &(0x7f0000000100)) [ 589.798531] 8021q: adding VLAN 0 to HW filter on device bond69 [ 589.805008] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 589.818978] loop4: p6 start 3496214528 is beyond EOD, truncated [ 589.834718] bond0: Enslaving bond69 as an active interface with an up link [ 589.867332] loop4: p7 start 1581527914 is beyond EOD, truncated [ 589.894773] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 589.904543] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:56 executing program 2: 12:21:56 executing program 5: [ 589.925811] loop4: p2 start 420544512 is beyond EOD, truncated [ 589.934706] loop4: p3 start 2114410187 is beyond EOD, truncated [ 589.957133] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 589.981855] loop4: p6 start 3496214528 is beyond EOD, truncated [ 589.998376] loop4: p7 start 1581527914 is beyond EOD, truncated [ 590.108008] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 590.117726] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 590.151293] loop4: p2 start 420544512 is beyond EOD, truncated [ 590.176434] loop4: p3 start 2114410187 is beyond EOD, truncated [ 590.197282] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 590.227938] loop4: p6 start 3496214528 is beyond EOD, truncated [ 590.242693] loop4: p7 start 1581527914 is beyond EOD, truncated [ 590.275489] bond0: Releasing backup interface bond69 [ 590.292506] bond69 (unregistering): Released all slaves [ 590.359744] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 590.447644] 8021q: adding VLAN 0 to HW filter on device bond69 [ 590.456904] bond0: Enslaving bond69 as an active interface with an up link [ 590.953779] bond0: Releasing backup interface bond69 [ 590.976262] bond69 (unregistering): Released all slaves 12:21:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x2000, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:57 executing program 5: 12:21:57 executing program 2: 12:21:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x5061ca4a, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xf8030000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:57 executing program 5: [ 591.252117] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:21:57 executing program 2: 12:21:57 executing program 5: [ 591.351126] 8021q: adding VLAN 0 to HW filter on device bond69 [ 591.381769] bond0: Enslaving bond69 as an active interface with an up link [ 591.392896] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 12:21:58 executing program 2: [ 591.413171] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 591.489912] loop4: p2 start 420544512 is beyond EOD, truncated [ 591.508396] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:58 executing program 5: 12:21:58 executing program 2: [ 591.548987] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 591.582427] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:58 executing program 2: [ 591.627012] loop4: p7 start 1581527914 is beyond EOD, truncated [ 591.965318] bond0: Releasing backup interface bond69 [ 591.981886] bond69 (unregistering): Released all slaves [ 592.042184] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 592.147258] 8021q: adding VLAN 0 to HW filter on device bond69 [ 592.171531] bond0: Enslaving bond69 as an active interface with an up link [ 592.797967] bond0: Releasing backup interface bond69 [ 592.839744] bond69 (unregistering): Released all slaves 12:21:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x390a, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:21:59 executing program 5: 12:21:59 executing program 2: 12:21:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x55000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:21:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xff000000, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:21:59 executing program 5: 12:21:59 executing program 2: [ 593.061998] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 593.084844] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 593.102959] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:21:59 executing program 5: 12:21:59 executing program 2: [ 593.150287] loop4: p2 start 420544512 is beyond EOD, truncated [ 593.176540] loop4: p3 start 2114410187 is beyond EOD, truncated 12:21:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0xffff1f00, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 593.196572] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 593.210484] 8021q: adding VLAN 0 to HW filter on device bond69 [ 593.229312] bond0: Enslaving bond69 as an active interface with an up link [ 593.229777] loop4: p6 start 3496214528 is beyond EOD, truncated 12:21:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000140)={'syztnl1\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x4, 0x1, 0x81, 0x80000000, 0x0, @rand_addr=' \x01\x00', @loopback, 0x7800, 0x8, 0x7, 0x8}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r1, 0x1, 0x8, 0x800, 0xff, {{0x3f, 0x4, 0x0, 0x0, 0xfc, 0x66, 0x0, 0x4, 0x2f, 0x0, @empty, @broadcast, {[@rr={0x7, 0x13, 0xbd, [@initdev={0xac, 0x1e, 0x1, 0x0}, @local, @dev={0xac, 0x14, 0x14, 0x41}, @remote]}, @timestamp_prespec={0x44, 0x4, 0xa8, 0x3, 0x5}, @cipso={0x86, 0x65, 0x1, [{0x6, 0x10, "5f8c45a55c17664dd011e5ec2930"}, {0x3, 0x11, "ab21d8c8dc927779c7245eeb5a01b1"}, {0x7, 0x10, "87dd384f20776633967c03e4eeeb"}, {0x2, 0xc, "cd118b68fa9ba51ddad7"}, {0x6, 0x4, "0c9f"}, {0x2, 0xe, "aaabf209e5e6def724b212e0"}, {0x5, 0x10, "401a2d2730219f3248ce510e37dd"}]}, @lsrr={0x83, 0xb, 0xe4, [@multicast1, @loopback]}, @ra={0x94, 0x4}, @cipso={0x86, 0x5b, 0x3, [{0x1, 0x7, "b98316d084"}, {0x7, 0xd, "2d7186a2da27049a9dd2ef"}, {0x0, 0x4, "db64"}, {0x7, 0x8, "bbac179db0f4"}, {0x7, 0xb, "ee756696c1e9386d5a"}, {0x5, 0x9, "bc7e419678602e"}, {0x0, 0x12, "f565420d13a628ae8028ae1762f9962f"}, {0x6, 0x9, "b118dc3386ff36"}, {0x7, 0x6, "0e6bb8a8"}]}, @noop]}}}}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r2, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000440)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000540)={'ip6_vti0\x00', &(0x7f00000004c0)={'syztnl1\x00', r1, 0x2f, 0x2, 0x40, 0x800, 0x27, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @private0={0xfc, 0x0, [], 0x1}, 0x20, 0x8000, 0x3f8, 0x400003}}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f0000000b00)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000580)={0x514, 0x0, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_DEBUG_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xa8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_BITS={0x70, 0x3, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl2\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xb6\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '--/,\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ' \x01\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x34}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x372}]}]}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x39c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xda, 0x4, "8623b4a216ecb69498780be090f15b83997cc059b2bd17915ed91db31585571eb9ed83b19de218ed9b02d11c183086eb1392fc68f5b0ca4baec516545a9d70c0c9251696b8cef14006687ca323a878edac4cb764cb501594871e768b4d15bc423ebd5f2dc1424390d6d535c8e4ea8fd2c0a99b8d700ba71589de47539347d09322dd13aa89b013e372d22cccc9182e069759efc01edfa960ab70e1bf78f2b77d4826804cdc7eeeaf0e4a02cfa27c61e3da03250dde176621bf24832bd06af27e3f2d46ea64ee9f0a53689237137fbab25d14e0cfea94"}, @ETHTOOL_A_BITSET_VALUE={0x6a, 0x4, "cb33cbf68556c1c87ece63b320af4d2348d50bd5d4a95c406aa9e68cf51be026e6e44db8b0da270ec0a1f8917a94e5c2928656827d434b2fae1b5524e113c99a96bce8e981a5e92b40e94bd85ae87af3a5ef7dfd52b2a358786c22e40f3d84c0849728c36030"}, @ETHTOOL_A_BITSET_BITS={0xec, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '(\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl2\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\f\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '##{]\\]\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ',,\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-\'\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl1\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x20}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '%&%-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '+\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '[\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl0\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x9, 0x5, "0e25499c19"}, @ETHTOOL_A_BITSET_VALUE={0x3b, 0x4, "1bea1c971cd0ae8a7fa0208493124073f17cd9ae7fbc1808d3c57f1891557b0c5d358e29c02ae3862eaa41897c3ef119778e9e990325ac"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x114, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl2\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '+.\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl2\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '-\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ' \x01\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, ':@,$}\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ' \x01\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x81}]}]}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7, 0x5, "86d73c"}]}, @ETHTOOL_A_DEBUG_HEADER={0x4}, @ETHTOOL_A_DEBUG_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x514}, 0x1, 0x0, 0x0, 0x44}, 0x8004) socket$inet6_udp(0xa, 0x2, 0x0) 12:21:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000012c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "0f"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "e6d27b"}]}}, &(0x7f00000014c0)=""/253, 0x42, 0xfd, 0x1}, 0x20) [ 593.264349] loop4: p7 start 1581527914 is beyond EOD, truncated [ 593.444299] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 593.449866] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 593.491420] loop4: p2 start 420544512 is beyond EOD, truncated [ 593.503577] loop4: p3 start 2114410187 is beyond EOD, truncated [ 593.528557] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 593.544236] loop4: p6 start 3496214528 is beyond EOD, truncated [ 593.550308] loop4: p7 start 1581527914 is beyond EOD, truncated [ 593.608998] bond0: Releasing backup interface bond69 [ 593.616856] bond69 (unregistering): Released all slaves [ 593.627720] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 593.633164] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 593.684584] loop4: p2 start 420544512 is beyond EOD, truncated [ 593.691674] loop4: p3 start 2114410187 is beyond EOD, truncated [ 593.706053] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 593.710882] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 593.722211] loop4: p6 start 3496214528 is beyond EOD, truncated [ 593.740935] loop4: p7 start 1581527914 is beyond EOD, truncated [ 593.783131] 8021q: adding VLAN 0 to HW filter on device bond69 [ 593.797202] bond0: Enslaving bond69 as an active interface with an up link [ 594.102976] bond0: Releasing backup interface bond69 [ 594.111127] bond69 (unregistering): Released all slaves 12:22:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x4000, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:22:00 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001500)={0x54, 0x13, 0x1, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x4}, @INET_DIAG_REQ_BYTECODE={0x4}]}, 0x54}}, 0x0) 12:22:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x60000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:22:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:22:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, 0x0, 0x10) 12:22:00 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x65, 0x0, &(0x7f0000000240)) [ 594.283297] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 594.320319] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 12:22:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xfd, &(0x7f0000000140)=""/253, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 594.338729] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 594.372430] loop4: p2 start 420544512 is beyond EOD, truncated 12:22:00 executing program 5: bpf$BPF_GET_MAP_INFO(0x15, 0x0, 0x0) [ 594.388391] loop4: p3 start 2114410187 is beyond EOD, truncated [ 594.407882] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 594.427444] loop4: p6 start 3496214528 is beyond EOD, truncated 12:22:01 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x6, &(0x7f00000004c0)=@filter={'filter\x00', 0xe, 0x4, 0x458, 0xffffffff, 0x208, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x3d8, 0x3d8, 0x3d8, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ipv6={@empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [], [], 'gre0\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "419fbe523d8151ec07a2cd52fd402c96ab8db389d2877e1450edf6a719fd"}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty, [], [], 'gre0\x00', 'vlan0\x00'}, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:ldconfig_exec_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3) 12:22:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:22:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000a2c94700000000000600000063373000ff"], &(0x7f0000000100)='GPL\x00', 0x7, 0xef, &(0x7f0000000140)=""/239, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 594.443701] loop4: p7 start 1581527914 is beyond EOD, truncated [ 594.466065] 8021q: adding VLAN 0 to HW filter on device bond69 [ 594.484644] bond0: Enslaving bond69 as an active interface with an up link 12:22:01 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0xf, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 594.645984] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 594.658601] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 594.693738] loop4: p2 start 420544512 is beyond EOD, truncated [ 594.721156] loop4: p3 start 2114410187 is beyond EOD, truncated [ 594.746183] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 594.769571] loop4: p6 start 3496214528 is beyond EOD, truncated [ 594.779716] loop4: p7 start 1581527914 is beyond EOD, truncated [ 594.797536] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 594.808475] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 594.832863] loop4: p2 start 420544512 is beyond EOD, truncated [ 594.850635] loop4: p3 start 2114410187 is beyond EOD, truncated [ 594.868553] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 594.884942] loop4: p6 start 3496214528 is beyond EOD, truncated [ 594.891473] loop4: p7 start 1581527914 is beyond EOD, truncated [ 594.899770] bond0: Releasing backup interface bond69 [ 594.912151] bond69 (unregistering): Released all slaves [ 595.003055] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 595.078478] 8021q: adding VLAN 0 to HW filter on device bond69 [ 595.097095] bond0: Enslaving bond69 as an active interface with an up link 12:22:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x5865, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:22:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @local}, 0x1c, &(0x7f0000000480)=[{0x0}, {&(0x7f00000000c0)="df", 0x1}], 0x2, &(0x7f0000000500)=[@hopopts={{0x18}}], 0x18}, 0x0) 12:22:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000140)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private}}}}) 12:22:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x60010000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:22:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x2, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 595.228483] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:22:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x17, 0x0, &(0x7f0000000040)) [ 595.345055] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 595.351178] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:22:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @local}, 0x1c, &(0x7f0000000480)=[{0x0}, {&(0x7f00000000c0)="df", 0x1}], 0x2, &(0x7f0000000500)=[@hopopts={{0x18}}], 0x18}, 0x0) 12:22:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x3, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 595.395283] 8021q: adding VLAN 0 to HW filter on device bond70 [ 595.437603] loop4: p2 start 420544512 is beyond EOD, truncated [ 595.448102] bond0: Enslaving bond70 as an active interface with an up link [ 595.451317] ================================================================================ [ 595.463936] UBSAN: Undefined behaviour in ./include/net/red.h:272:18 [ 595.470425] shift exponent 75 is too large for 64-bit type 'long unsigned int' [ 595.477607] loop4: p3 start 2114410187 is beyond EOD, truncated [ 595.477780] CPU: 1 PID: 22614 Comm: syz-executor.5 Not tainted 4.19.150-syzkaller #0 [ 595.491725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.501069] Call Trace: [ 595.503660] dump_stack+0x22c/0x33e [ 595.503833] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 595.507349] ubsan_epilogue+0xe/0x3a [ 595.507370] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 595.523652] ? kvm_clock_get_cycles+0x14/0x30 [ 595.528192] ? ktime_get+0x21b/0x320 [ 595.531978] choke_enqueue+0x2a7e/0x2cc0 [ 595.536050] ? choke_reset+0x410/0x410 [ 595.539991] ? __lock_acquire+0x6ec/0x3ff0 [ 595.540290] loop4: p6 start 3496214528 is beyond EOD, truncated [ 595.544224] ? lock_acquire+0x170/0x3f0 [ 595.544302] ? __dev_queue_xmit+0x1425/0x2ec0 [ 595.544325] __dev_queue_xmit+0x14e1/0x2ec0 [ 595.560301] loop4: p7 start 1581527914 is beyond EOD, truncated [ 595.563103] ? netdev_pick_tx+0x350/0x350 [ 595.563132] ? lock_downgrade+0x750/0x750 [ 595.563148] ? ip6_finish_output+0x610/0xcc0 [ 595.581846] ? ip6_finish_output2+0x1777/0x2370 [ 595.586521] ip6_finish_output2+0xe78/0x2370 [ 595.590939] ? ip6_append_data+0x300/0x300 [ 595.595177] ? lock_downgrade+0x750/0x750 [ 595.599331] ? check_preemption_disabled+0x41/0x2b0 [ 595.604357] ip6_finish_output+0x610/0xcc0 [ 595.608613] ip6_output+0x205/0x7c0 [ 595.612257] ? ip6_finish_output+0xcc0/0xcc0 [ 595.616675] ? ip6_fragment+0x3390/0x3390 [ 595.620836] ? ip_do_fragment+0x2210/0x2210 [ 595.625267] ip6_local_out+0xaf/0x170 [ 595.629077] ip6_send_skb+0xb3/0x300 [ 595.632870] udp_v6_send_skb+0x7d6/0x16e0 [ 595.637030] udpv6_sendmsg+0x2406/0x2b40 [ 595.641094] ? ip_do_fragment+0x2210/0x2210 [ 595.645444] ? udp_v6_push_pending_frames+0x380/0x380 [ 595.650636] ? mark_held_locks+0xf0/0xf0 [ 595.654719] ? mark_held_locks+0xf0/0xf0 [ 595.658783] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 595.663465] ? __local_bh_enable_ip+0x159/0x2a0 [ 595.668161] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 595.672816] ? inet_autobind+0x130/0x190 [ 595.676889] inet_sendmsg+0x174/0x640 [ 595.680734] ? security_socket_sendmsg+0x83/0xb0 [ 595.685496] ? inet_sock_destruct+0x800/0x800 [ 595.689995] sock_sendmsg+0xc7/0x130 [ 595.693709] ___sys_sendmsg+0x7bb/0x8f0 [ 595.697689] ? copy_msghdr_from_user+0x440/0x440 [ 595.702450] ? find_held_lock+0x2d/0x110 [ 595.706513] ? __fget+0x386/0x570 [ 595.709973] ? lock_downgrade+0x750/0x750 [ 595.714126] ? check_preemption_disabled+0x41/0x2b0 [ 595.719157] ? copy_fd_bitmaps+0x2c0/0x2c0 [ 595.723395] ? lock_acquire+0x170/0x3f0 [ 595.727386] ? __might_fault+0xef/0x1d0 [ 595.731369] ? __fget_light+0x1d1/0x230 [ 595.735353] __x64_sys_sendmsg+0x132/0x220 [ 595.739589] ? __sys_sendmsg+0x1b0/0x1b0 [ 595.743685] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 595.749050] ? trace_hardirqs_off_caller+0x6e/0x210 [ 595.754068] ? do_syscall_64+0x21/0x670 [ 595.758054] do_syscall_64+0xf9/0x670 [ 595.761862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 595.767049] RIP: 0033:0x45de59 [ 595.770243] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 595.789225] RSP: 002b:00007f75b22b1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 595.796928] RAX: ffffffffffffffda RBX: 000000000002e380 RCX: 000000000045de59 [ 595.804193] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000000000003 [ 595.811461] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 595.818728] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 595.825997] R13: 00007ffdb91fc93f R14: 00007f75b22b29c0 R15: 000000000118bf2c [ 595.833298] ================================================================================ 12:22:02 executing program 2: r0 = socket(0x2, 0x1, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x14}, 0x14}}, 0x24000004) 12:22:02 executing program 5: syz_emit_ethernet(0x62, &(0x7f0000000040)={@link_local, @broadcast, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "bcd8de", 0x2c, 0x6, 0x0, @loopback, @mcast1, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 12:22:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x4, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:22:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x653e0000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) [ 596.183957] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 596.189836] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 596.225885] loop4: p2 start 420544512 is beyond EOD, truncated [ 596.269913] loop4: p3 start 2114410187 is beyond EOD, truncated [ 596.299004] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 596.318808] loop4: p6 start 3496214528 is beyond EOD, truncated [ 596.330197] loop4: p7 start 1581527914 is beyond EOD, truncated [ 596.475190] bond0: Releasing backup interface bond70 [ 596.486730] bond70 (unregistering): Released all slaves [ 596.520571] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 596.576665] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 596.582665] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:22:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x6000, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:22:03 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x5) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x18}, 0x0) 12:22:03 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 12:22:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0xa, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 596.626343] loop4: p2 start 420544512 is beyond EOD, truncated [ 596.670557] loop4: p3 start 2114410187 is beyond EOD, truncated [ 596.681397] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:22:03 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x143, 0x0, 0x0) [ 596.711936] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:22:03 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @local, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x3, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x1, 0xa}}}}}}, 0x0) [ 596.756954] loop4: p6 start 3496214528 is beyond EOD, truncated [ 596.782937] 8021q: adding VLAN 0 to HW filter on device bond70 [ 596.798606] loop4: p7 start 1581527914 is beyond EOD, truncated [ 596.805447] bond0: Enslaving bond70 as an active interface with an up link 12:22:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x5c, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:22:03 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f00000003c0)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c, 0x0}, 0x0) 12:22:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x68000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) 12:22:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000a2c94700000006"], &(0x7f0000000100)='GPL\x00', 0x7, 0xef, &(0x7f0000000140)=""/239, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 12:22:03 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0xb5, &(0x7f0000000080)=""/181, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 12:22:03 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000040)={@link_local, @multicast, @val={@void, {0x8100, 0x0, 0x1}}, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "b46032", 0x28, 0x6, 0x0, @ipv4={[], [], @dev}, @empty, {[], @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}, 0x0) [ 597.175906] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 597.188191] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 597.230171] loop4: p2 start 420544512 is beyond EOD, truncated [ 597.252186] loop4: p3 start 2114410187 is beyond EOD, truncated [ 597.268002] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 597.285530] loop4: p6 start 3496214528 is beyond EOD, truncated [ 597.291871] loop4: p7 start 1581527914 is beyond EOD, truncated [ 597.323578] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 597.332583] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 597.354612] bond0: Releasing backup interface bond70 [ 597.357784] loop4: p2 start 420544512 is beyond EOD, truncated [ 597.369689] bond70 (unregistering): Released all slaves [ 597.379234] loop4: p3 start 2114410187 is beyond EOD, truncated [ 597.394607] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 597.413594] loop4: p6 start 3496214528 is beyond EOD, truncated [ 597.437839] loop4: p7 start 1581527914 is beyond EOD, truncated [ 597.455583] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:22:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x6558, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:22:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt(r0, 0x0, 0x32, &(0x7f0000000440)="c8", 0x1) 12:22:04 executing program 2: 12:22:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x102, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 597.520974] 8021q: adding VLAN 0 to HW filter on device bond70 [ 597.530358] bond0: Enslaving bond70 as an active interface with an up link [ 597.554608] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 597.560109] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 597.589445] loop4: p2 start 420544512 is beyond EOD, truncated [ 597.609145] loop4: p3 start 2114410187 is beyond EOD, truncated [ 597.630570] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:22:04 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000d80), 0x10) 12:22:04 executing program 5: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') 12:22:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f00000000c0)="64a313b29553fc06404a67c385e48397c0f5d92565bbf0bd22d01034a5127909299313a7a54be36b23ddd47083a3bcf4dbef182637d31bea191d938fb3e0a955fcb31cc5e4b8ff05c94aa75e8de2909392d74d7c93fb88fc44fb626df89b466747a5a07629876b811694a6c20647c3691f51a7fa6ed37904afac167e3ab07f173fddbc8f066e50f5d11eb3b3", 0x8c, 0x0, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) [ 597.637349] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 597.642448] loop4: p6 start 3496214528 is beyond EOD, truncated [ 597.668032] loop4: p7 start 1581527914 is beyond EOD, truncated [ 597.722452] 8021q: adding VLAN 0 to HW filter on device bond71 [ 597.729383] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 597.734820] bond0: Enslaving bond71 as an active interface with an up link 12:22:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x118, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 597.763340] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 597.801816] loop4: p2 start 420544512 is beyond EOD, truncated [ 597.825944] loop4: p3 start 2114410187 is beyond EOD, truncated [ 597.842204] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:22:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x6c000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:22:04 executing program 5: pipe(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_wait(r0, &(0x7f00000002c0)=[{}], 0x1, 0x0) 12:22:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x21, 0x0, &(0x7f0000000040)) [ 597.868222] loop4: p6 start 3496214528 is beyond EOD, truncated [ 597.881237] loop4: p7 start 1581527914 is beyond EOD, truncated 12:22:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000080)=@framed={{}, [@alu={0x4}, @alu={0x7}]}, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xfd, &(0x7f0000000140)=""/253, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 597.973331] bond0: Releasing backup interface bond71 [ 597.992870] bond71 (unregistering): Released all slaves [ 598.065376] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 598.154559] 8021q: adding VLAN 0 to HW filter on device bond71 [ 598.162229] bond0: Enslaving bond71 as an active interface with an up link [ 598.223232] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 598.235344] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 598.267170] loop4: p2 start 420544512 is beyond EOD, truncated [ 598.292479] loop4: p3 start 2114410187 is beyond EOD, truncated [ 598.318808] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 598.341258] loop4: p6 start 3496214528 is beyond EOD, truncated [ 598.353299] loop4: p7 start 1581527914 is beyond EOD, truncated [ 598.483682] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 598.493756] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 598.509564] bond0: Releasing backup interface bond71 [ 598.521149] bond71 (unregistering): Released all slaves [ 598.521189] loop4: p2 start 420544512 is beyond EOD, truncated [ 598.543352] loop4: p3 start 2114410187 is beyond EOD, truncated [ 598.559603] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 598.579068] loop4: p6 start 3496214528 is beyond EOD, truncated [ 598.595062] loop4: p7 start 1581527914 is beyond EOD, truncated 12:22:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x8100, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:22:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt(r0, 0x0, 0x1600bd77, 0x0, 0x0) 12:22:05 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0xf, 0x0, &(0x7f0000000040)) 12:22:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x1b0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:22:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x74000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) 12:22:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bond_slave_1\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x3b, 0x2, [{0xa8b}, {}]}}) [ 598.710746] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:22:05 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x2, &(0x7f0000001480)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 12:22:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r6, 0x0) r7 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r7, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b48040a945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) [ 598.855729] 8021q: adding VLAN 0 to HW filter on device bond71 [ 598.876717] bond0: Enslaving bond71 as an active interface with an up link [ 598.920576] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 598.930649] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 598.958608] loop4: p2 start 420544512 is beyond EOD, truncated 12:22:05 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_sset_info={0x37, 0x0, 0xbe9b}}) [ 598.971981] loop4: p3 start 2114410187 is beyond EOD, truncated [ 599.002616] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 599.045168] loop4: p6 start 3496214528 is beyond EOD, truncated [ 599.062359] loop4: p7 start 1581527914 is beyond EOD, truncated [ 599.086576] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 599.098861] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 599.109731] loop4: p2 start 420544512 is beyond EOD, truncated [ 599.122000] loop4: p3 start 2114410187 is beyond EOD, truncated [ 599.132064] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 599.146359] loop4: p6 start 3496214528 is beyond EOD, truncated [ 599.152712] loop4: p7 start 1581527914 is beyond EOD, truncated [ 599.243929] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 599.252176] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 599.260509] bond0: Releasing backup interface bond71 [ 599.274666] bond71 (unregistering): Released all slaves [ 599.279156] loop4: p2 start 420544512 is beyond EOD, truncated 12:22:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}, 0x80) 12:22:05 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@multicast2, @broadcast}, &(0x7f0000000040)=0xc) 12:22:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x1e0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 599.325517] loop4: p3 start 2114410187 is beyond EOD, truncated [ 599.367900] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 599.370543] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 599.401713] loop4: p6 start 3496214528 is beyond EOD, truncated [ 599.439023] 8021q: adding VLAN 0 to HW filter on device bond71 [ 599.444986] loop4: p7 start 1581527914 is beyond EOD, truncated [ 599.454365] bond0: Enslaving bond71 as an active interface with an up link 12:22:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0xf000, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:22:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x7}}, &(0x7f00000002c0)=""/235, 0x1a, 0xeb, 0x1}, 0x20) 12:22:06 executing program 5: pipe(&(0x7f0000000d40)={0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 12:22:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x7a000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:22:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x1f2, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:22:06 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000000)={0x8, 'vlan1\x00'}) 12:22:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x0, 0x0, 0x2}, 0x40) 12:22:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x201, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 599.650467] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 599.663395] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 599.669221] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 599.705920] loop4: p2 start 420544512 is beyond EOD, truncated [ 599.730568] loop4: p3 start 2114410187 is beyond EOD, truncated 12:22:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000040)) [ 599.761143] 8021q: adding VLAN 0 to HW filter on device bond72 [ 599.769584] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 599.785455] bond0: Enslaving bond72 as an active interface with an up link 12:22:06 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x21, &(0x7f0000001480)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 599.808287] loop4: p6 start 3496214528 is beyond EOD, truncated [ 599.826801] loop4: p7 start 1581527914 is beyond EOD, truncated 12:22:06 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000340)) 12:22:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000012c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4}]}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "0f"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "e6d27b"}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000014c0)=""/253, 0x51, 0xfd, 0x1}, 0x20) [ 599.973368] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 599.983498] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 600.007024] loop4: p2 start 420544512 is beyond EOD, truncated [ 600.026518] loop4: p3 start 2114410187 is beyond EOD, truncated [ 600.051482] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 600.081382] loop4: p6 start 3496214528 is beyond EOD, truncated [ 600.097235] loop4: p7 start 1581527914 is beyond EOD, truncated [ 600.251543] bond0: Releasing backup interface bond72 [ 600.269115] bond72 (unregistering): Released all slaves [ 600.344029] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 600.446450] 8021q: adding VLAN 0 to HW filter on device bond72 [ 600.465267] bond0: Enslaving bond72 as an active interface with an up link [ 601.043544] bond0: Releasing backup interface bond72 [ 601.058298] bond72 (unregistering): Released all slaves 12:22:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0xf0ffff, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:22:07 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x3, 0xf4240, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 12:22:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x12, 0x4, 0x0, 0x2}, 0x40) 12:22:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x218, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:22:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x84020000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) [ 601.267191] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:22:07 executing program 5: r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x9) 12:22:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x891b, &(0x7f0000000040)={'veth0_to_bridge\x00', {0x2, 0x0, @dev}}) 12:22:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x284, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 601.374876] 8021q: adding VLAN 0 to HW filter on device bond72 [ 601.395930] bond0: Enslaving bond72 as an active interface with an up link [ 601.483370] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 601.491901] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:22:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1c, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 601.541272] loop4: p2 start 420544512 is beyond EOD, truncated [ 601.578587] loop4: p3 start 2114410187 is beyond EOD, truncated 12:22:08 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x13, &(0x7f0000001480)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 601.611760] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:22:08 executing program 5: socket$inet_icmp(0x2, 0x2, 0x1) pipe(&(0x7f0000000000)) [ 601.658938] loop4: p6 start 3496214528 is beyond EOD, truncated [ 601.691261] loop4: p7 start 1581527914 is beyond EOD, truncated 12:22:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bond_slave_1\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x3b, 0x2, [{}, {0x427, 0xff}]}}) [ 601.870585] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 601.885071] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 601.914241] loop4: p2 start 420544512 is beyond EOD, truncated [ 601.931454] loop4: p3 start 2114410187 is beyond EOD, truncated [ 601.948116] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 601.964148] loop4: p6 start 3496214528 is beyond EOD, truncated [ 601.978070] loop4: p7 start 1581527914 is beyond EOD, truncated [ 601.989801] bond0: Releasing backup interface bond72 [ 602.013910] bond72 (unregistering): Released all slaves [ 602.062305] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 602.160731] bond72 (unregistering): Released all slaves 12:22:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x1000000, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:22:08 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000540), 0x4) 12:22:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x88000000, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:22:08 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmmsg(r0, &(0x7f0000007ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 12:22:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x2d0, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:22:08 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @local, 0x6}, 0x1c, 0x0}, 0x0) 12:22:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x3, &(0x7f00000005c0)=@framed, &(0x7f0000000600)='GPL\x00', 0x4, 0x91, &(0x7f0000000640)=""/145, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780), 0x10}, 0x78) [ 602.361857] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 602.413122] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 602.431934] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 602.458913] loop4: p2 start 420544512 is beyond EOD, truncated [ 602.468127] 8021q: adding VLAN 0 to HW filter on device bond72 [ 602.476055] loop4: p3 start 2114410187 is beyond EOD, truncated 12:22:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x2d8, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:22:09 executing program 2: setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000300)={0x0}, 0x20) r0 = socket$inet6(0xa, 0x3, 0x9) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 602.502027] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 602.502071] bond0: Enslaving bond72 as an active interface with an up link [ 602.530986] loop4: p6 start 3496214528 is beyond EOD, truncated 12:22:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @local, 0x6}, 0x1c, 0x0}, 0x0) [ 602.558511] loop4: p7 start 1581527914 is beyond EOD, truncated 12:22:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x9, [@var={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e, 0x5f, 0x61]}}, &(0x7f0000000380)=""/4086, 0x31, 0xff6, 0x1}, 0x20) 12:22:09 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @local, 0x6}, 0x1c, 0x0}, 0x0) [ 602.704091] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 602.709944] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 602.745188] loop4: p2 start 420544512 is beyond EOD, truncated [ 602.762358] loop4: p3 start 2114410187 is beyond EOD, truncated [ 602.786989] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 602.814785] loop4: p6 start 3496214528 is beyond EOD, truncated [ 602.847713] loop4: p7 start 1581527914 is beyond EOD, truncated [ 602.949026] bond0: Releasing backup interface bond72 [ 602.959957] bond72 (unregistering): Released all slaves [ 603.047772] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 603.129155] 8021q: adding VLAN 0 to HW filter on device bond72 [ 603.151239] bond0: Enslaving bond72 as an active interface with an up link [ 603.593296] bond0: Releasing backup interface bond72 [ 603.606414] bond72 (unregistering): Released all slaves 12:22:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x2000000, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:22:10 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @local, 0x6}, 0x1c, 0x0}, 0x0) 12:22:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000480)={'ip6_vti0\x00', 0x0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x74, r2, 0x20, 0x70bd2d, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}]}, @MPTCP_PM_ATTR_ADDR={0x18, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x74}, 0x1, 0x0, 0x0, 0x44801}, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WDS_PEER(r3, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x100, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x4, 0x28}}}}, [@NL80211_ATTR_MAC={0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x40008}, 0x24008004) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x4, 0x4, 0x54, 0xffffffe1, 0x0, @dev={0xfe, 0x80, [], 0x44}, @ipv4={[], [], @multicast1}, 0x1, 0x10, 0x2, 0x80000000}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x9c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private2={0xfc, 0x2, [], 0x1}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, [], 0x37}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @broadcast}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @private1={0xfc, 0x1, [], 0x1}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private0}, @NLBL_MGMT_A_DOMAIN={0xd, 0x1, 'mptcp_pm\x00'}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) 12:22:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x8b4fba10, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="b02173a2525f016effffff78156a0e21dd941add6a63a6da508df11257aefad01119a4124929f8d8511b90accb97da7b16b77b5d50a95414a64ccb56077e979e427e5131f33a259b9c05223c9d9477346a0495853f1b060bf94d908dafcfaf5036280ec82fc4098083672eade96adf5dbd5249f0c9f8d6d1d75bc9990dfb231248de5f632af25a71611a1cc7a725e54a726b983b5b9d255a1a91273b5f3f9a8cedf618a3578021036353340b0d3d1bd765e5f6d7ecab90ea380226ee5a3f9fa0e6391cb69327e09264d0c3bb448d1e06d85be68fe68c8e825bd31ce4c8115da11fc26a33445ee1471af5b9ba3c3da2d76782bd57ad6862c48c5d6750f6d6fa6f7936e4a1ea929bc289a2a7e2c216bccca75c23c52e0df348b29b36786a5ba9be1e018ca69c1267a073c361818beef695f326c5afec9185c0ed4126b8772608f5b607dbcc5be7e777f87dc6500624650ecf1b01b8a1787230ca98056154ccc4dad8ca2f0b02dc3dc04e61ecd4d70e345c51262ea4553437cd66eec144e68931ced97dba642f2b4a8cf45924dd3617e640aecb858593b08f30a259a7175558d65c3004c576b411dfed03f9514c9f6545425a6c3eec4f91a17d1d9e8222dad8c9c03afe9bb09133dde501a706d05788ccd30e5ce37a9b6ab8cd6ac5f8bc698920bcaab454ec6a32c2f4beb1a956abd26276", 0x1f0, 0x6}]) 12:22:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x300, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:22:10 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @local, 0x6}, 0x1c, 0x0}, 0x0) 12:22:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x3bc, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 603.794644] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 603.817284] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 603.840540] loop4: p1 size 4294901760 extends beyond EOD, truncated 12:22:10 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @local, 0x6}, 0x1c, 0x0}, 0x0) [ 603.867091] loop4: p2 start 420544512 is beyond EOD, truncated [ 603.900285] loop4: p3 start 2114410187 is beyond EOD, truncated [ 603.912841] 8021q: adding VLAN 0 to HW filter on device bond72 [ 603.933876] bond0: Enslaving bond72 as an active interface with an up link [ 603.944654] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:22:10 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @local, 0x6}, 0x1c, 0x0}, 0x0) [ 603.979264] loop4: p6 start 3496214528 is beyond EOD, truncated [ 604.000794] loop4: p7 start 1581527914 is beyond EOD, truncated 12:22:10 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @local, 0x6}, 0x1c, 0x0}, 0x0) 12:22:10 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @local, 0x6}, 0x1c, 0x0}, 0x0) [ 604.218784] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 604.227076] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 604.248428] loop4: p2 start 420544512 is beyond EOD, truncated [ 604.261163] loop4: p3 start 2114410187 is beyond EOD, truncated 12:22:10 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @local, 0x6}, 0x1c, 0x0}, 0x0) [ 604.308346] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 604.326453] bond0: Releasing backup interface bond72 [ 604.359881] loop4: p6 start 3496214528 is beyond EOD, truncated [ 604.380396] bond72 (unregistering): Released all slaves [ 604.384159] loop4: p7 start 1581527914 is beyond EOD, truncated [ 604.488705] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 12:22:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="fe000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000100025080046f99ff4c3c99b102ef800", @ANYRES32=r5, @ANYBLOB="060000000000000008000a000f"], 0x28}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x3000000, 0x0, {0x10, 0x0, 0x0, r2}}, 0x20}}, 0x0) 12:22:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, 0x0, 0x0) 12:22:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000000)={0xa, 0x4f21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=[@hoplimit_2292={{0x14, 0x29, 0x1600bd75}}], 0x18}, 0x0) 12:22:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_read_part_table(0x97ffffff, 0x29, &(0x7f00000003c0)=[{0x0, 0xfffffd35}, {&(0x7f0000000400)="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", 0x1f0, 0x6}]) 12:22:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x3f4, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) [ 604.573723] 8021q: adding VLAN 0 to HW filter on device bond72 [ 604.581356] bond0: Enslaving bond72 as an active interface with an up link [ 604.688115] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 604.732604] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 604.746787] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 604.763753] loop4: p2 start 420544512 is beyond EOD, truncated [ 604.772273] loop4: p3 start 2114410187 is beyond EOD, truncated 12:22:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x370, 0x0, 0x0, 0x148, 0x3f8, 0x0, 0x2d8, 0x2a8, 0x2a8, 0x2d8, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee", 0x38}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 12:22:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, 0x0, 0x0) 12:22:11 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1801005c07000000000000000000106271e944dfff840000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000340)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba63cca555fedbe9d8f3b423cdacfa7e32fe023136f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25dfd73a015e0ca7fc2506a0f68a7d06d7535f76907dc6751dfb265a0e3ccae669e173a649c1cf96587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c33283ba58d31a20a2251258f8a97db00fab5e2658d496b41085c8e09aa881"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) recvfrom$inet(r0, 0x0, 0x0, 0x7, 0x0, 0x0) syz_emit_ethernet(0x107, &(0x7f0000000480)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x4e22, 0x9c, 0x0, @opaque="8174b9193f286b3694a6d2dab8860c3187b14e476b3fc791dd683f23da29134646368eb023362bd91f67d60b479de11a32b6392be503d04524a59c543780b27e3f61fb3cd61140da8463194ec24c3903380b119e042667f642c06223285f65a0e288897bf9f0e6389673085b6246d182863eef4a937d7d29c17cff6d3fb06aad9d285571165328714482ddc31e0f66d51754a31c54bc94b5b6bb19da9f35fbf0fd81ba6efb7147085ea52d8371ba870bc1a8276d263a4d7c14c06d456762ba623709a184dacfc4b2f15ffc17688b280f384080d8cc34e6440c5227b731a076c03d97867995b74282c939b437eff2f75c11119b1a0e5d2aaaa5698d47563c0108b26faa15a57b9b36dfaf4718168a37efcdee6253f6e6669abae6d6d894f731166fb676e71c0a7b7143c1c97f4b67fbd8dafa840b4ec81bd7ddd5ff2a23804b285987750ed6ef22e1538e386438b7a8f7e8a5f40c0d6306db9dce627c7ccf15ffe6a402576ca1dc009be797e9f49d8bf579ec1c47c9ad53361db3669b96046a3317833109a2ba1bdc1f61e054a3e66890f3076a4c097b2fe0aeab47d048e643b699a4f8d34e17172bc52eb74a5f1966243361be032b676e0d1e80678d90731d988c7293199f2d1784427fdb89051d3150439fc4e62948b692fab64b24f46ac5a87ecfea676cd281c7a3ee97a92bdcfa31d3d95e0513d55e49556b1b2f6ad837ee56f62d0dfb9946af4f25c6379d2a38ffb66260af6d32672fe245ff08bdef329b41ef2b9a59df5b1d4a989954330b704bbd45d08daf36bcb3886359dc9bcf43f3d033ef5300a74d642fee3814087abcd89cfbe6da7b9c7f9aeb4bc90f35c853296ba2be3434789a9a8170a91b0288019db035ec6d973432b969db0a721208e4d12b079c3f7ef586739ef4bead38781e9ce950ae170c73ff4081bbb617d45564a8f2ef44405d4a55b443c7fa091d81e97bc1aa43fcf9b60d5aec2752dfa9c5ba49adbcdcb8f4129f058126dbc9d362f5a4d67cbd26961c56d80142ec1a3a6fcbce799811da3951b9fb14d87969335a3fdcfd21ec3e2400883782bcc836de26ccf7b28e4759765addbdef82ee8ce9f2e4f8967d63534748165a6fbc6b2d99588d6f0858e63a7f32e4598fde5c6793e5fe6bdcc1c7f7cf4023676f714fcbf5a9ccaee244be6544f1b885ed3d9b48cf922c54056c4efeb02b51f3cebc358e5009836f4746108b5616d25e493363df996cb72118cef6b51a9a13548157483d13339e7054271c097812a5767b335a55d90ee0beccb012eb0799cd64489d1fe12e84a077245f5f84072e5452ceba20eecf7c4c4d4de7fb51a46325f383a64376d93380cf20c402af9dd6b6a9418411477d34bb3335c903a6654748bdb8e7c271ce3e950c27088560e1b2f9763ae1969001a300bfd5e3e41b55693168a75ca8c14f7710d880f5f53a563b2b4d6639072850454bff58719173c0e568fb3d56107fff078a716b2a9702805fcc59da4b45704bcaa9d00fcc3f0f8336c4de0fda0251d2588e7d3bc62934ca5007c756071b7ba7f0da9f874149d13aa33b0ef1086c05200680824a32794998f6daa01995f4d3b9880839d1a7f67dbdbd45b5a4493b21cecc08f8114369509475b75eec1aac7b49837e5cb524b4cb3f34c52dd9d40ff5241c02b1f2bc03139255fefc5280b2275cea5c3c720b3ada2186c9409e97c955b722a6b8f00c1b30ca3efea6642cc146ffdbd030040d329ae3cf9020844bf6244f6106e63bd109829cecbae7b17695fbeaecdb7f5dd61f92d3e0f27a32f0f96be5654bf2ae19244265ab1e7430a166c54339f2d283c3f2eff163951874b819b1ee0a8ef9bb3529868560ebe9221820e3e1f5ac61ed28512e1ed737cd9bc7657fe01699226921a778603d32d9b6894436ab11348b9f27054d3452888a831f3efaa274e78d2ece9ac02c18602a91e09556f804fe1700ad85c191ae514a5c84c38d2c47f81192b7e276afa216d59301b1ce06cd37e4bad93b3890b8dd27d03ce6a225153261a0748af9bdf8bab36b741dde885170071e40bab43ee348cdb9880f0231df59a383829790f0f3e41373027763c26e44bf87e6c135cadd937ffead6ad4799d4c25572016abad88460b53dfa1cf323020d3974ebd101c69510384d058c37f8a64ffdebc5b26c02833c03552dfc8e832b398d9aa6ac8a68a9fa11b741840f9c308139786728fc5a80dd79c86ff97e6aa3dc4c2bfdb8fcdce1da3d1e58aee227702d369738832e0174d72af32576623e0d56e064e3cfce292a5d9365f4b93aebceab58194625b89609fefc48b488e3fee7340fec0425ba695149e80a160955e8275694198b006205e082c95a2f40e58d51808ded1c665ac738026b096528327954a72aae30d0588987f332eebb88d9200b5b9a2ea46c59cf906abbbd77a3ee408d3ba39988953aa18846162ad5cc98b39182a4b79ff544e36a9895cae23452fca675502f03656aa823c7f9aaa28b358f8fa01490cec55df73b620e062d5c6eb34e2128f9a624f651b66a38336f8b4aedbc7d70b19977cad8968d258fea896eb8eeba3a5f5da3406a53103cedcba171bc9f30d20ca20565f56c8912292aa4ff8ed917996cb42777c88b5cf1a67e075dbfdf660aa89055c13d3927f63a99d3dcc6ed283882b91a2a70107d57b9c258ecca08f6d79738353be1f7814a7de3c3698cee72f752846c7bb917f36b7a185418a0ae4639292c6cfdd582ca3f3fa22d424f1f88129854a27a2de4d37aff4cdfd955c20e999af304157112203526ce55b01798de3883daa72ddfd23988b512e7243e31fd468bf591b02fc62e1e5253a8810844baae22defaff6650b3c8a0e7d291367ae212e3e28c70f88aa0cbc804d4ec88a5a9b76d305aa4e99262194fe405d175b3c00524a4fa033aee81f2c92392993077f4a59a2aa8770929ddbd4cf616a05304d7289662aa512992430b038b134b567ee4b2e3775cddfa5611b70c461dc7f18c028c853dc5ee1cd8b39a0732a5fff3ffdd51c05b0c6844794c8d24272856f7f07ac2ef3f3372d47a2224a93dc1e51d5b426f3eb0349fbcbf6149aa77523e0d693aaef51b81495d934501c428fa7b98cde4dd71bc4a6e72bcbdbd54a6145b4f960fed065812cba48b88397fa877bba7f11a27efb0bbaa2f700e68f9afb254975ba8ca4ca985007f19ba439ebe68df5b94d616c18c67a790a28f883d934935e288c297ca9939c22778bbbd3dc91a4be5ed959043c43b1608fbbd9f7750edf4e7e44fc85bc98a2a35545e1f90f3c2566eb167598dc9efab9b70f4bcd895cc563ac32cac459f6f8be191bf98af71591356c855063c0bdd5274f19bfdbd9eb0a2caf6938571b8d544095c5427d468a4d11612b50c32aa3427947710f709828d83bc61608efb3825d50ed19ecc67bd95d145b23aca20828fadc5f4a70ff04aaf7e845e3d5f01342629fc35d19a744f66e10714f297631c9359c4aa94fb7fcb76ba5b0ec88d7dc77d87a79ab2e8573882db4877de92a6108292ec11e331fbc89541c49ed8a16024fc9d91a0ca8c5cbd193f331a52fb5ea9154e187285345be2d7198da1de0f332e8a4d2a5ad1cf2a6ae588456a9b5afc6d1357b70af3ab0a0da2700df487309357e9bc282920e46ddd00f59dc62cc39302f769fc7edd1332882800985bf7f35f2f7a0f61c98f47108116c49ae5714f7b408ed5dc956a507072128f8e38db48e8b88cc5ed15bd6402828b495864bdf0c5cc5dbee67b75a40bea3a1a84d617e9b12cbd6f062679ea2aac1bce0ba1170aa993bf3efedc8edbc28e6df8d61cdad13cdad3b94018ffba8b138605fd690110c65e1210801decedd08217587d19a177c5390ab02288449c3e25bb6aba285098e87a3fc1f0e427e70f7f8f8adbb34abdc1d993570d0e468c7fcdbda2ad06fe076194c4a95d02fa6503aeeb26986dc94816efe272d16d74495d565e7fe7728f4fbb8d9cfcf9d81836653ec6352e455791b30f38b7e33f34635371c94a71282c66f14ef2092c36921a941021a8513690696d28136683b6b26bc19b6783957e62c98fb6c71ab1f141ccea59b7094d6d8d3bd8a502b65e885298199ace086d23d92f1d23de85b1aab534b4e077632da83d09ba4fe69313349b16a7de4098cbfc3fa5a3a0c848e00ad3427fe7024681284d5caa191f90c0ae652e4d1ba1b4b13b1316dd0a2d58aadc16ad594bc6510c80fe82d99ba22b7ce445c14685532d7b2225d41209609f27437f5e1ebbb967dc2ab74bd10e4f3e938fa08f94a550c53d067d6b404177694bb41e36d72f4c3200da660f4b87cec0ef3e9d6eb47a8ff24b9b052c64aa39b72d6668f414c410b97eb00ffd1729053497bcc06f6ef81a0eacfcd7fdb235a214d9d671303bf8c38dd949d98c9bedec93a9f6b2eed7bd4f64c2a431ef1282662be908eb1e5ea8b4e525737da5e809f3f17593b07c27cfd1fc63e8b879a8ec0cb9c142335ca5bc1adbfcf4546c76f6d006bee28f1301c5e605394a6bd01ca1b9e301e047cdaedfeee8f4c3ef9ec52da03a126f41e3c396ab9d3c0267c8ad28fefc363b0ee5a06fab2ffd9c840bdf69c01a7e5840192fd4851ec5ba71b44f275a8896f28851bb809fe803830bd700df6876c5a12d9a0a2a79b518e32560df803d4e0b226b631df29e26e217d7ba3623fab7724b6ea95a5d2539ab01eb2c6d6da84eeecc2c7df0dbc2fd0bed12da656f5a5c3f71f29729d02ecad1df48e86746fb0618bf93cfeefe72e5c1f7baa9d7459cbf232052f10de99b6094d7513b2150874996a45bc69dc2d3e7d28bec48cef4f537995d523874bd189c67a4b3292384f6fdd99dca25aafdf50041cb8a7b88d193fff905b596de6f068bf4295b55ab78f00c3d50fd2323237e374bd9b3d8f820183da9b45c196906538457678d7f459c48522b543c2c4d7a9fe90ab94e306dafef5d8488d328807e681853c6bba12fadef71b5238cf509a747b2b6f2c43bf435ba6dcd2209302ffc196be44338af77c918587198e3ad710c710aed564fcf79ff210dfc7050b88ebfb75f62052eb4b4638c959398e8c7e510be21ba9984b4c80f991523249d62f354094e2f31c134d3c60e81afbec01142d3380ae5992b29f6b6758e95c93f38753fb3afec4f62fafb4eaee86331672a104a2bac3afae6acc2e0117678340310312dc51f72d7b840f308bc22adf251670c8566974c67a1da5238b98eba9a0d391dc4fca1fd29c93ca13ae67dc67a35e18fa1fcdfd5cdb5f733980ca9f2f04fd4d0728830eb7dc8c65b5e4bf14694d2aac21dfb88f7d50d7579498dbde5ebd063fc2f7703d1c322e72c7a69a0afb7e578e4ab4a650ca8333297ffa49e6444469ecaefbc810d22d2d0edbe28bc5e14ffb8000ed50e3fd3d1fddd27f32ab7c38cb7342ca9ad0d451efcf878eb5748fb65f11829efa4ebf600fe1e747dfafdd3a2089c6a3f73ec3c4dd3ec12982017bb7648e3934c0cd12b18c2044c3cc422dd58ca4bcc8850fe1afa0aba340470a0f13c5d3b1366a5c7c3f9a92ef6062123d1dab1873573d6ae2627441a6b3f003294b203fc041ad10c95a21db04d54fb94a0897b372b503866955009114d3ed23e4e69ec2790aabe99a7c390724dea099e296b43db2b1281b73708d757cad1a34e5eb6dd97a45a6accc7b687cb5095e55e98cd5757eaba533dbb0e310a7047675bb0018b51e12fc8df5c3ebbb8c07a62a6555ec3e7eb274e8e67fdeeab880be1ef516769c23926f85ab0fbcaf0f5ebc270aa3e58be53833c75bd431"}}}}}, 0x0) [ 604.781994] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 604.790218] 8021q: adding VLAN 0 to HW filter on device bond73 [ 604.802160] bond0: Enslaving bond73 as an active interface with an up link [ 604.811047] loop4: p6 start 3496214528 is beyond EOD, truncated [ 604.818813] loop4: p7 start 1581527914 is beyond EOD, truncated 12:22:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, 0x0, 0x0) [ 604.963079] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 [ 604.968959] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 604.991103] loop4: p2 start 420544512 is beyond EOD, truncated 12:22:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) [ 605.012959] loop4: p3 start 2114410187 is beyond EOD, truncated [ 605.048447] loop4: p5 size 3848601600 extends beyond EOD, truncated 12:22:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) [ 605.079126] loop4: p6 start 3496214528 is beyond EOD, truncated [ 605.099557] loop4: p7 start 1581527914 is beyond EOD, truncated [ 605.231904] loop4: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 12:22:11 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) [ 605.264017] loop4: p1 size 4294901760 extends beyond EOD, truncated [ 605.276510] bond0: Releasing backup interface bond73 [ 605.290648] loop4: p2 start 420544512 is beyond EOD, truncated [ 605.299510] bond73 (unregistering): Released all slaves [ 605.304810] loop4: p3 start 2114410187 is beyond EOD, truncated [ 605.320251] loop4: p5 size 3848601600 extends beyond EOD, truncated [ 605.347030] loop4: p6 start 3496214528 is beyond EOD, truncated [ 605.371671] loop4: p7 start 1581527914 is beyond EOD, truncated [ 605.418235] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'.