00)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x2f, 0x0) 17:55:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x25, 0x2}}) close(r2) close(r1) 17:55:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x88950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xffffffffffffffff, 0x5, 0x100000001, 0x35, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) r1 = bpf$MAP_CREATE(0x4, &(0x7f0000000140)={0x4000003, 0x6, 0x740003, 0x0, 0x10, r0, 0x10001}, 0xfffffffffffffec8) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1, &(0x7f00000001c0)="84eea396c28ebc7e97fc30148dc7a44562406669cae114f208b7f349dcf0dd4ff5f9fc01000080ffffffff01dab40da0233d423b4c69c62f1d52af884b3bcb40a96a9d5b645211231d351ab77a3486066d576fd8b076e831dc79e6ad489f848f43f3c290d098970908b02a16cb5b17b0e07e4946920c933163ffc9efe91a251af90fc346c93cb2ef6a0c8ea8a5488e850f08dfb22df7e941791702db9c9274a1cf63240983e079ad836c0b74782fb0ff4db9996d8d4876f7a1"}, 0x10) 17:55:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8930, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x30, 0x0) 17:55:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x27, 0x2}}) close(r2) close(r1) 17:55:51 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x5, 0x100000001, 0x35, 0x0, 0x1}, 0x2c) fcntl$getflags(r0, 0x40a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) getuid() getegid() getgid() r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f00000000c0)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r1}, 0x2c) 17:55:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x88a8ffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8932, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x31, 0x0) 17:55:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x5, 0x100000001, 0x35, 0x0, 0x1}, 0x2c) r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x1, 0x400) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000180)={r1, 0x2}) r2 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f00000000c0)={0x3, 0x0, 0x740000, 0x0, 0x20820000, r2}, 0x2c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x7fff, 0x0) 17:55:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2039.819191][T13095] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:52 executing program 3 (fault-call:4 fault-nth:0): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x32, 0x0) 17:55:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8933, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x89950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2040.359404][T13140] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8936, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x11, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x33, 0x0) 17:55:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x29, 0x2}}) close(r2) close(r1) 17:55:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8a950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x88, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x34, 0x0) [ 2040.889271][T13184] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8937, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2a, 0x2}}) close(r2) close(r1) 17:55:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x2, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8b950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x35, 0x0) 17:55:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8940, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2041.474121][T13224] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x36, 0x0) 17:55:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8941, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2b, 0x2}}) close(r2) close(r1) 17:55:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x4, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8c130000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8942, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) [ 2042.034764][T13269] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x5, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x37, 0x0) 17:55:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2c, 0x2}}) close(r2) close(r1) 17:55:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8c950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x6, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x38, 0x0) 17:55:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8943, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) [ 2042.604518][T13311] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x8, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2d, 0x2}}) close(r2) close(r1) 17:55:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8947, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x39, 0x0) [ 2042.946092][T13339] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0xb, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8d950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x30, 0x2}}) close(r2) close(r1) 17:55:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8948, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a, 0x0) [ 2043.363126][T13369] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x10, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2043.560599][T13388] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x31, 0x2}}) close(r2) close(r1) 17:55:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8949, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8e950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3b, 0x0) 17:55:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x11, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2043.956594][T13422] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x12, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x894c, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3c, 0x0) 17:55:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x32, 0x2}}) close(r2) close(r1) 17:55:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8f950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8970, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) [ 2044.450039][T13459] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x13, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3d, 0x0) 17:55:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x33, 0x2}}) close(r2) close(r1) 17:55:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x90950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8971, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x17, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2045.017128][T13501] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3e, 0x0) 17:55:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8980, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x18, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:55:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x91950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x41, 0x0) 17:55:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x19, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2045.494317][T13539] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8981, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:55:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x92950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x1a, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8982, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x42, 0x0) [ 2045.905946][T13571] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x1d, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x38, 0x2}}) close(r2) close(r1) 17:55:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x93950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8983, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x43, 0x0) 17:55:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x21, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2046.421469][T13610] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x39, 0x2}}) close(r2) close(r1) [ 2046.604867][T13630] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x44, 0x0) 17:55:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8990, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x94950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x31, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x45, 0x0) 17:55:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2047.029222][T13663] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:55:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3a, 0x2}}) close(r2) close(r1) 17:55:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8992, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x33, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x95950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:55:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x46, 0x0) 17:55:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:55:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3b, 0x2}}) close(r2) close(r1) 17:55:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8993, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:55:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x35, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:55:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x96950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x47, 0x0) 17:56:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x7f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x36, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8994, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3c, 0x2}}) close(r2) close(r1) 17:56:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x97950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x37, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x48, 0x0) 17:56:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8995, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3d, 0x2}}) close(r2) close(r1) [ 2048.393312][T13778] validate_nla: 2 callbacks suppressed [ 2048.393321][T13778] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x38, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x49, 0x0) 17:56:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89a0, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3e, 0x2}}) close(r2) close(r1) 17:56:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x39, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x98950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x4a, 0x0) 17:56:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3a, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2049.016061][T13829] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89a1, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x41, 0x2}}) close(r2) close(r1) 17:56:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x4b, 0x0) 17:56:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x99950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3c, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89a2, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2049.543034][T13867] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3d, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9a950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x4c, 0x0) 17:56:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x42, 0x2}}) close(r2) close(r1) 17:56:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89a3, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) [ 2049.944124][T13902] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3e, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x4d, 0x0) 17:56:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x43, 0x2}}) close(r2) close(r1) 17:56:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89b0, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x42, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9b950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x44, 0x2}}) close(r2) close(r1) 17:56:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x4e, 0x0) [ 2050.514820][T13953] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x43, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x40049409, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) [ 2050.740065][T13971] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9c950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x4f, 0x0) 17:56:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x45, 0x2}}) close(r2) close(r1) 17:56:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x46, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x4020940d, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) [ 2051.117226][T14000] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x48, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9d950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x46, 0x2}}) close(r2) close(r1) 17:56:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x50, 0x0) 17:56:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0xc0045878, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x49, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2051.592240][T14037] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x51, 0x0) 17:56:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x47, 0x2}}) close(r2) close(r1) 17:56:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0xc0045878, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x4a, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9e950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2052.131886][T14085] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x4b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0xc0189436, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x52, 0x0) 17:56:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x48, 0x2}}) close(r2) close(r1) 17:56:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9effffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x4c, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x49, 0x2}}) close(r2) close(r1) 17:56:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0xc020660b, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) [ 2052.628452][T14123] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x53, 0x0) 17:56:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x4d, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00?', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4a, 0x2}}) close(r2) close(r1) 17:56:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9f950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x4e, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x54, 0x0) 17:56:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x0f\xff', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4b, 0x2}}) close(r2) close(r1) 17:56:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa0950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB="000000675d000001"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x55, 0x0) [ 2053.705179][T14209] validate_nla: 2 callbacks suppressed [ 2053.705190][T14209] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000003c3f93051a012512b86f6aa26a10932d57718634800e65cf8676ff39a5657210d573bfbae42932806f8d340554fd2207578b1616246b42fdba236fd39f9b800e38155fd2bc2ff7ddf35e494f17da70f6820aa37fb6722f7cfd63ae95388eee40935d0f5a93000000000000000000000000000000"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000140)={'nat\x00'}, &(0x7f0000000000)=0x78) 17:56:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4c, 0x2}}) close(r2) close(r1) 17:56:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x56, 0x0) 17:56:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa1950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:06 executing program 3: sysfs$2(0x2, 0x8001, &(0x7f0000000140)=""/4096) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2054.297750][T14250] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x57, 0x0) 17:56:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4d, 0x2}}) close(r2) close(r1) 17:56:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa2950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$udambuf(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/udmabuf\x00', 0x2) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2054.778811][T14287] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x58, 0x0) 17:56:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4e, 0x2}}) close(r2) close(r1) 17:56:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0xb8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa3950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x7, 0x101400) getsockname$netrom(r2, &(0x7f0000000180)={{0x3, @rose}, [@default, @netrom, @default, @null, @rose, @netrom, @bcast, @null]}, &(0x7f0000000200)=0x48) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000012c0)=ANY=[@ANYBLOB="00000000000000007a2b26b4c8c45c7d1c6a306b010000001fe2f5e2f6614ae5aede75e9cf46dcd2bfb6b11bda52e4149f83b49d1381e7f59ef76167115f0bb7ca76413df0e5b189f9e6d7427f6b706d238a3a5cfe1294a32aa90a77073194a91b1430cb97ce814d0000000000e1dae79823f6c76e40e3d8c6837e4b80c3bae55c87ad133214d8281a1024575afa52c1a7511d4f876710df2f87c6ee70146d388fe5242b4aef462f97b103765f6ed85edac71945c9a70098a7b22dad7d55feb3b152aeb06e16c138f529c2625e37b67099d31cee84b0b3e00ff8bf11a9a0e52346226833e46b66a180fcd318a5d63c94ac42ff29812894fe12f70d508588e606ad3a26d149b4aae2a6bb69fbc44f5923c84d34aa07514748032772ed33f405a7985361051e5362f8d0bf"], 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000001280)={0x4, 0x7, 0x7, 0xdd1, 'syz1\x00', 0x7}) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000240)=""/4096, &(0x7f0000001240)=0x1000) 17:56:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x59, 0x0) 17:56:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2055.236461][T14326] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x81, 0x124) getpeername(r0, &(0x7f00000001c0)=@hci, &(0x7f0000000240)=0x80) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000140)={0xffffffff, 0x40, 0x401}) ioctl$TCSBRK(r1, 0x5409, 0x0) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000008f01e7dbb61eb48c3fd30000db"], 0x1) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4f, 0x2}}) close(r2) close(r1) [ 2055.513508][T14343] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x5a, 0x0) 17:56:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa4950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x9) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x8, 0x4) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB="0000000000000010"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) [ 2055.893623][T14373] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x50, 0x2}}) close(r2) close(r1) 17:56:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf18, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x5b, 0x0) 17:56:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x4) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) r2 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001480)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001580)=0xe8) syz_mount_image$ntfs(&(0x7f0000000140)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x538ac40c, 0x5, &(0x7f0000001400)=[{&(0x7f00000001c0)="ebca5c3b85d79573079d525832f629eb3370e9b4599f9e60ab2ce4bf9f661aa84762506811fadf13df1ba7653f15a9bdc44ed5bd921196f85d4e243e13336724ad11201c8d6b2ae3bc5768a37028f14285e2de2b60064a144e368b2bfc0bdfbaf3fb6b2bf1a01feaf04387c8c142d734c010b1d3ce8c89381c8424f12425317cc00e91f6cb4f7f230e552e3e7774272306dc581697b298ccc915", 0x9a, 0x4}, {&(0x7f0000000280)="68231500bcd9ce01687894fa32a9f427c58ed7d799f6f8fa9b58a602e6da16a2bed28b394e9d288f93d38c48fd17ae2385a4851062ff16495739f2c340e1cc236ae995204ab417bd3c6c318a1a2c886f5c366c19531c03ac66cd0cf2f059bb7cb037da3b534c19eb001eb0a53a64", 0x6e, 0x9}, {&(0x7f0000000300)="b93c2f719816a88c19f238681af106a1e8a1881d1a17b3a40db3fba8686ebc73f2b0d31112972148a5439658d09cc0", 0x2f, 0x5}, {&(0x7f0000000340)="b9b04a5eeb1b5203f554efa82f3d1a2289d56e2b1ba414f20489205a39a5904084d896784dc39458fbbddf7fe12d8028d8cc855bb2e5a48ecaf7616646672e27ee8b5fa062e5018561f75abbb160e11f5cb0614ded92b8aac3987fe762551a45f7c0f18e49d0e382f7fac66bcdd043e329ae874a39d709df0512a3e579c1157360777554fe7d74f13fc58d71093068931c91b8ab1057426f85b9ce8d03b57343ceb15e2c9fb004948fbfc456a1", 0xad, 0x5}, {&(0x7f0000000400)="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", 0x1000, 0x3ff}], 0x4480, &(0x7f00000015c0)={[{@disable_sparse_no='disable_sparse=no'}, {@case_sensitive_yes='case_sensitive=yes'}, {@disable_sparse_no='disable_sparse=no'}, {@fmask={'fmask', 0x3d, 0x100000001}}, {@umask={'umask', 0x3d, 0x9}}], [{@fowner_gt={'fowner>', r2}}, {@hash='hash'}, {@uid_lt={'uid<', r3}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@obj_role={'obj_role', 0x3d, '$'}}, {@appraise_type='appraise_type=imasig'}]}) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa5950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x51, 0x2}}) close(r2) close(r1) 17:56:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1020, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2056.491961][T14425] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) r2 = dup2(r0, 0xffffffffffffff9c) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000140)={[0x1, 0xfffffffffffffff8, 0x0, 0x1, 0x7, 0x0, 0xffffffffffff8001, 0x6, 0x0, 0x6b2a, 0x8000, 0x7ff, 0x9, 0x8000, 0x1a, 0x3ff], 0x4000, 0x10010}) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x5c, 0x0) 17:56:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x180f, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x3}}) close(r2) close(r1) 17:56:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa6950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x5d, 0x0) [ 2057.067870][T14475] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:09 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x802, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000002600)='/dev/dmmidi#\x00', 0x0, 0x400000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000002640)={0x0, 0x66, "aed4360db3f71f905d0288bfe7be0998ef09986ab0a0d37710d66c3e2f535032565019ecf439ca5f4c5583a6f5a532a146335c8ab69a44b092826758cd7cf79df8cf77efd1b44467779c2135cd20b3a3a3b141fdafd834748be84f58fcc6db2c96a6628eb1e1"}, &(0x7f00000026c0)=0x6e) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000002700)={r2, 0x401}, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r0, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f00, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2057.352777][T14496] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="0000000000fd00000dd0d5bd2feb91655273253de82fc21b3cfa2510b07e4193cb139912971a3bd3c04792214d597545f2a53ebc2775b8a7311f8b882801731e4db5a87c932250ba0e2d68c6b9a41a302ef7199bbd8b7badb5e9cb4d3be3566842abf35da20573a01e097f4b0fe544e5e966b8d479feb467050fd2f8938e795d73"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00\x0f', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x5e, 0x0) 17:56:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa7950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="1500000000000000cef8f21e705187216a7329026a2fe00dbd15c6c08d0a821f8125a2bc56947cb33b94487458a64beb444a1c3e8c14ef19ab2717f81fe19964cc16b1cef5d72b5259c86bdcf702f79d9db855bd4cc2ce8f496b2dd74688bee8b4e1641dd59dc9aa70c7621d49bb8ecadcc4f9b2da7cc345a723f1466cd9f0d9bf383dce948a09028269da93e7f8f168174d7b2c3ea8043c45a7b4cae138dbbe6dcceaed50d79862f7c78a914b790e285203986dc80d4891e3e8c37713adad6069f1ccff6241abd16bc89bb0758c71dd74d8543030d93159ebef7fdf804356d57f6889fc29544cf8e4aa9c5111e36c4c32aa"], 0x8) r2 = dup(r0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000240)={0x3, 0x0, [{0x7, 0x4, 0xfff, 0xda, 0x3}, {0xc000000b, 0x9, 0x2, 0x10001, 0x401}, {0x0, 0x7ff, 0xfffffffffffffff9, 0x3, 0x3}]}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xaca383eae6c930, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 17:56:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2057.665545][T14521] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x5f, 0x0) 17:56:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa8950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x80000001) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000140)=@srh={0x2f, 0xa, 0x4, 0x5, 0x400, 0x60, 0x7, [@remote, @mcast2, @empty, @empty, @mcast2]}, 0x58) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x200080, 0x0) recvfrom$x25(r2, &(0x7f0000000200)=""/214, 0xd6, 0x40000022, &(0x7f0000000300)={0x9, @null=' \x00'}, 0x12) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x60, 0x0) 17:56:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000003, 0x80030, r2, 0x180000000) r3 = gettid() ptrace$setsig(0x4203, r3, 0x6, &(0x7f0000000140)={0x16, 0x6179, 0x100}) 17:56:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa9950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x400040) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0xb5, "c5db6b86717a5b522b30dcf3766ff38687e28e3649897bc0ba9a0bd276e051c9a08b49ccdf2977e0d959d3c881555c8d10f740433a5c47e755dd189063296ee25bab0b97dfb3495d2f1521f2fc32ccf2a1baf09d71a3b267ccc671fd55d50c7a866863e491eec253c7f2b2d487b2063288609637e3f2dc67a83aa2f91eed2233df5b64da3a8144969016e61503e0a6886232392f912f888df66483ced8c3b9daa88c21db1e6d61dcec3b080577f2975a58199f9771"}, &(0x7f0000000200)=0xbd) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={r2, 0x8, 0x10}, 0xc) r3 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r3, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x61, 0x0) 17:56:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xaa950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x62, 0x0) 17:56:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'ifb0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}}) r1 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2058.981773][T14629] validate_nla: 2 callbacks suppressed [ 2058.981784][T14629] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x101000, 0x0) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000180)={0x0, 0x1, [0x400, 0x100, 0x0, 0x0, 0x3, 0x1, 0x1, 0xd06d]}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xab950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x63, 0x0) 17:56:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) [ 2059.484529][T14672] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:11 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x3f, 0x40) r1 = socket$unix(0x1, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001f80)=[{{&(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @loopback}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000300)="4f7ad8674be7be5b2cd562b58b757c28a0c414b632149375cb24087635d1a4f8ee2d4ca0c3739fd60f1709d332f8df47b0c71d74ccb7ea50e73d99acafb13217baba4409ed7f4f9774b944639a8e727915", 0x51}], 0x1, &(0x7f00000003c0)=[{0xc8, 0x110, 0x227, "666da80445876e47b4436bef0c4f7386f67b9cc4cacbf94eabdeff4d6c1c3a152f2ce76ef271a53a45a28f3ddb7af93857ad76da84e83e0e43d5674d817b3741500e101e3fdb9f22d78b817466d181d37b58a7731aa57b8b19aac373e5c2353adf733b7af4769e500aa031e0023f4e3738ca96f6e018c0325591ec39c48fe09565e03f26e02e4045802c585874ee93b07a4559cd79a2747b3e082d1d530d0919418695689f1fbca29e99a577b7309d28c0"}, {0x90, 0x10f, 0xffffffff, "72aef59366cea6cf85372732f1cfe73226790569b4b504a7058e9863defb860680924de24f7d0a049adc2c4fe5d44fa9d02039ed9a9f6ec7bad1dc0b495b4ab09252209e6070ddfa8080f7b6e7c51e7e9df76b4116342521a5dca8902fa7f812c7661e51d3b563613cd51b8f846c5199e1e4935e482fbeaf296251bb19"}, {0x18, 0x115, 0x19f9, "ed92"}, {0x20, 0x118, 0x3, "da17ed3d889e37a081485805121eaed2"}, {0x80, 0x112, 0x80, "90453d3e55c6cee1e27a612acd8185c8d98c4484f2885c008bb86e07a6c53e02aee905dfbfb1c1314207d8030c427ca695a0c05aaf925599cdfc427a5c6110b78e8048f022d6d62cf8e896918c7e7b9cf3b2f9dba766d22bdc0632ad72a1e2fcf0cc6639e55ec563d4f1d4e69b0dec"}, {0x68, 0x3a, 0x9, "6e2de25ce3228449eb7917be402bff505b4d2bc7ed850d4efb1f9a1255e5872c22e7a63ec1d5d0c6d9321734549285716f4ba4002c1d97c3778c25b7e2d9a8c5f7b5f3b164619fd759772e3bc5a06d4eb22412b43b34"}], 0x278}}, {{&(0x7f0000000640)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x3, 0x4, 0x3, {0xa, 0x4e21, 0x80, @loopback, 0xa2}}}, 0x80, &(0x7f0000001a40)=[{&(0x7f00000006c0)="ac4837741c271df068a8fb7e00313aba5f77709b0fce8ed55527417543fff815fdff8c6054", 0x25}, {&(0x7f0000000700)="777213fe7a10f867cec938d025e6a705ee422446f26ef4836a174c747d0289c7718fbecad32b7c90d1877f925d31981ee73730c29255ada55fc68d05a8541d2c3e0ffb8068d6e78c15122dbed1ad360f79372f8e632d00ac26", 0x59}, {&(0x7f0000000780)="f3fae7d13fa4b6ab76bc517096c9c74f9ec771abb698534275cec67d02fb620aa8977e95d0144fbd3d7cf5d96ce780ad539019d1adea681f69a65a7db9cfa4082adf73f7898bdeeea4ea893977d5fd6adf23aa65f16964a4ac95371f32ec117e127819db144bc17357619a6d8b35770762dc83fbb11fbe9822fd4d6171d6fe9b45f06b8e9eae9c798e181fba556bf861d66de337734fa47f3f839c87c9a089aa9efc6121e7806c335ff20a09f014eccae8f25233dbc0cb191099becb", 0xbc}, {&(0x7f0000000840)="69fb57f63e815db1b48b30ac494939f82eefde2d5648f757975717b06f182e880a4bcb393ee4253adfac97346c5620f7cf0d80582a6fbbb690202930961f6aacfbba142892718aefbe0eab1e2283fc0c", 0x50}, {&(0x7f00000008c0)="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", 0x1000}, {&(0x7f00000018c0)="a383e8a3f60294c43d7c5948328488cee80beac0ace3a3501447e0a3cfe9ead253c9165804450c537f30ad0ab61ae190ee0b7fc5f43850afaaff6750435a612f733b3a4392f4afaab31a54e7bb2ad5f70ff1ada23389", 0x56}, {&(0x7f0000001940)="c07fb2977fba2f70735068b603e3bc38cf485e80e419f3dabae07c6b87220e899bf88d0e3765d2e556610f0b4e3f2659c146ebfd3692e2a73d3d469decfbca0cc25e6611c0b2e1a41a0d3217066855ac0310ace90041e1d898aa9e4d3170d3602c7a35f37b14d2171928abbf0b628422588ac7c117cd1779eb3989078d6ad808de90961058fd58882b97c9", 0x8b}, {&(0x7f0000001a00)="fd57379a6712b248cd859383f9bab9ffc85f5b7a85497f5e329debc8372e7ad8325f80edfed417945a39cbc27d4a55a41be6d7706c17b1", 0x37}], 0x8, &(0x7f0000001ac0)=[{0x38, 0x105, 0x4, "05608d00f41e5eee3e025465d4b947c9bceebb5257ddf12c4040707c6b130c622a44b5ab7f"}, {0x68, 0x12f, 0x9, "33afe41aa8c21d8055f234ed375c6966347294e621f745ae4dd3b00b9ae60e4f5e48cd85c735864a794306574fc1d89b7e16b12ba5a121d696fa9fec0e92b0567f3f8aca7360f6c91aee7a2568296245aac6306d45c9"}, {0x98, 0x115, 0xb81, "c23bd4173bcf53ba05d3cdeb59b3141e8527c74981646a2fc56479b1550a58fb252edb02a26dba217b2354142e1096d1c8de0d11a1bf19e5d8a5cbefb9637c319ceb495a2348b06924ff0110fe75df10d3bbd276fc8f00f2d8dc6288af9285c2b08e5f8579ed1e4b478acfc1d7c4b3eacb1c72989dfa3a7e790829d4b86555df4c0d9a3d62"}, {0xe0, 0x109, 0x121a06ec00000000, "8c7f5b8e1a94225701234e70d1c9771ddb6ac73c5e4adbbb7ecd259382ca64f8434935180038501e44e8b0384f4af45a27303c47f1c46a40d9bb9146fa7a82c9f3b056b6121cf6e0452567e0e5b3cb46a4530663796c8154369abb20032a5272ba06e6e7dbfac565f5a0e09531a6fe441630592e3670777a0098750f022dc2f725c46b4c48130a33bd3e09752d9176066fdb25b01bc39a0c93fc479541c31ad6cdae2f19878de406f6d22aa404dfe575674ec22a91c1a50dd191fb26d0e91cb92d83742a9f187a16e2168f08bc"}, {0xb0, 0x29, 0x4, "f42f9f297ebf4bb71bc95d81ccaee258e3cd1a60ef4bb424efaa96f431d4e58cba71a13df9d9d807c79905c2ac7b39ba58f244b5d11ceeb83d1000eb00488ceeabb7b13aef10ed1c1e1b39c24238a975fc68944a1d44ced2b858da8c6f3a788d38453ca3d7ee3ba3b0c8136efaf835ad16c11dcae8d1866af7eddd001381fbc7c776aace533a556ec9f89188691eb9ac1c656fdf5cd9a1581c"}, {0x38, 0x3a, 0x3e0000000000000, "447f79af50b016677e94b94400c7cdfb597c71c84e758643e8c72abb5e62e02a4cc48b16f37e"}, {0x70, 0x114, 0x2, "5cb295fc36d7925e325315733c9b1a9e6539dcfe4d26b2bdf3ce64c8ff16be61a4015789813e7afe6c03d4c9f734153083dc4899654eacef344a4939f824a4ed27babd3717a247d2366d11ddb132b729c1369169afda097ab07c73d51e6f"}, {0xe8, 0x10e, 0x3, "7a3bca566824c6a5d7c12f399f01ded825ee775b4a37fc9f9f4da19709570d8ac37936d32c4735e861406b5552150be942a161f0ab928224fcd6e0121a15226bd1cabf2fa871817194be38836d398e2d161e1ec89af83f2403cc8ca56359c4c76895679a339473dfa3055060d0950a62889f2eb042fb50e77138d9a1df8cf8082be8d59200910dc876db466579a52b985fdfa770e1c543c5de180a2f69f9e1e64289ef39bf93276068b1cf6c9be31eb38c249749b554d2cdc19caa4f0c577c5c22346ecffd3e0e18eb249c271cf5ce878e"}, {0x10, 0x10c, 0x6}, {0x50, 0x11, 0x6, "de45818e666808fe876c663029d5b63c63e4085536960f369ddf2cd96bca20bd4d04d0443f7fe2dc8f6e56e0cae9f551ad6df82d83389ff52a58868c9872191e"}], 0x4b8}, 0x1f}], 0x2, 0x40) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) iopl(0x3) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x80) getsockopt$inet6_buf(r3, 0x29, 0xd3, &(0x7f0000000140)=""/156, &(0x7f0000000200)=0x9c) r4 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB="5512c4b800000000"], 0x8) getsockopt$inet6_buf(r4, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xac950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:12 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1ff, 0x20000) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x141000, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x8100, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x40, 0x2000) r5 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x28000, 0x7) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x200, 0x0) fsetxattr$security_capability(r4, &(0x7f0000000380)='security.capability\x00', &(0x7f00000003c0)=@v2={0x2000000, [{0x10001, 0x3}, {0x12, 0xfffffffffffffffc}]}, 0x14, 0x1) r7 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x400000, 0x40) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x200000, 0x0) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000006c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000680)={&(0x7f00000005c0)={0xb4, r1, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}, @NBD_ATTR_SOCKETS={0x1c, 0x7, [{0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xa}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x48e}]}, 0xb4}, 0x1, 0x0, 0x0, 0x40000}, 0x40) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r10, 0x29, 0x3b, &(0x7f0000000340)=ANY=[@ANYBLOB="ca0500000000000000000008000000"], 0x8) getsockopt$inet6_buf(r10, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x64, 0x0) [ 2060.010199][T14717] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:12 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x44, &(0x7f0000000140)=""/164, &(0x7f0000000200)=0xa4) 17:56:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x65, 0x0) 17:56:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) [ 2060.242429][T14732] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2, 0x2}}) close(r2) close(r1) 17:56:12 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1000004000, 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={0x0, 0xfc, "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"}, &(0x7f0000000440)=0x104) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000480)={r1, 0x7}, &(0x7f00000004c0)=0x8) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x204c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x10008000400203) r3 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000001f3718104724de490461ff88c676101cbce6883c45b347acb80a7565bdf345fe7d7addced1203b40491600c4da610a3060d9ba8d99d10d6ec6d9ae4b546e6f28e63b39d2c569d6acce0e1c0808a9058855f4075b966dcb813591c1da97cca8200"], 0x8) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/\x00\x00\x00\x0e\x00\x00\x00\x00\x00\x00\a/expire_nodest_conn\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) fstat(r4, &(0x7f0000000240)) getsockopt$inet6_buf(r3, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) socket$bt_bnep(0x1f, 0x3, 0x4) 17:56:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xad950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3, 0x2}}) close(r2) close(r1) 17:56:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) [ 2060.638848][T14766] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x66, 0x0) 17:56:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="0004e700000000007c6d9badf75b24ed097c9edca100eb5780ddd58fdfaeea86176a1c3b56f2a3fc257be041a3294bdbd24c1e593af8ad0750c91fdc75ca72a912a22e000000"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4, 0x2}}) close(r2) close(r1) 17:56:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xae950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB='\x00\x00'], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x67, 0x0) 17:56:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)) r0 = perf_event_open(&(0x7f00000006c0)={0x5, 0x70, 0x8d4, 0x96c, 0x100, 0x23130efa, 0x0, 0x6, 0xa0102, 0x2, 0x2, 0x8, 0x5, 0x7fff, 0xfffffffffffffffa, 0x3, 0xffffffffffffff67, 0x9, 0x2, 0xffffffffffffffe0, 0x4, 0x2, 0x81, 0x3, 0x5b9, 0xf90b, 0x80000001, 0x4, 0xcdc, 0x9, 0x3, 0xef73, 0x245, 0x4, 0x200, 0x2, 0x3, 0x1000, 0x0, 0x3, 0x5, @perf_bp={&(0x7f0000000680), 0x5}, 0x400, 0x0, 0x101, 0x9, 0x7, 0x7ff, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x820000400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x8000000) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) readv(r1, &(0x7f0000000580)=[{&(0x7f0000000080)=""/82, 0x52}, {&(0x7f0000000000)=""/59, 0x3b}, {&(0x7f0000000140)=""/166, 0xa6}, {&(0x7f0000000200)=""/72, 0x48}, {&(0x7f0000000280)=""/190, 0xbe}, {&(0x7f0000000340)=""/70, 0x46}, {&(0x7f00000003c0)=""/206, 0xce}, {&(0x7f00000004c0)=""/3, 0x3}, {&(0x7f0000000500)=""/47, 0x2f}, {&(0x7f0000000540)=""/64, 0x40}], 0xa) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000640)={&(0x7f0000011000/0x2000)=nil, &(0x7f0000013000/0x3000)=nil, 0x2000, 0x1}) close(r1) [ 2061.152331][T14804] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={'security\x00'}, &(0x7f0000000000)=0x54) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000001efc0b362c2c7b3f50993887c7a05b48ea86d517b96b07c225cf8e4dc12967"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x40, 0x0) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000200)) 17:56:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x5, 0x2}}) close(r2) close(r1) 17:56:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0xfffffffffffffffb, 0x84) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x40) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001680)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@loopback}}, &(0x7f0000001600)=0xe8) connect$can_bcm(r3, &(0x7f0000001780)={0x1d, r4}, 0x10) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xaf950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x68, 0x0) 17:56:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:13 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x250a00, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x17) syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x401, 0x40) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2061.645908][T14838] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:14 executing program 5: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000014000/0x4000)=nil, 0x4000, 0x4, 0x2010, r1, 0x2) r3 = userfaultfd(0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r4) close(r3) 17:56:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="00005f8e6c2e4259b21b15e9d3f7dade5926af061478cd69d3fe9f0cf7f0fbf72f425ca7603a83a695a3463e15be24543a255fb75bb509c68f5ed701118b9f10fcf593bde71c129fb212ba4af80db3c503845c6f7e4b4fa7abb5e6d5d1f3ad0ff84126add76fe83b2984f44f6ba355e78fccecb431857349816ef6a5fd0d"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x6, 0x2}}) close(r2) close(r1) 17:56:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x69, 0x0) 17:56:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xb0950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8001, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f00000000c0)={0x0, 0x0, 0x80000001, &(0x7f0000000080)=0x2}) close(r1) 17:56:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0x4f2) r1 = socket$inet6(0xa, 0x802, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB="0600000000000000"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2062.287683][T14892] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x7, 0x2}}) close(r2) close(r1) 17:56:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x6a, 0x0) 17:56:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x400001) r1 = socket$inet6(0xa, 0x7ff, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000afee74da09000000000000007d2f495c7344abfd00000000f2e2301f598e86e84311b9f364"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xb1950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x8, 0x2}}) close(r2) close(r1) 17:56:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bond_slave_0\x00', 0x1000}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r3) close(r2) 17:56:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) socket$tipc(0x1e, 0x5, 0x0) [ 2062.904611][T14940] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x6b, 0x0) 17:56:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:16 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000340)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000380)={{0x287434b3, 0xfffffffffffeffff}, 'port1\x00', 0x20, 0x410, 0x4, 0x1, 0x3, 0x6, 0x1f, 0x0, 0x2, 0x1}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000440)={'broute\x00'}, &(0x7f00000004c0)=0x78) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c, 0x800) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @initdev}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f00000002c0)={@remote, @dev={0xfe, 0x80, [], 0x1e}, @empty, 0x0, 0x1ff, 0x8c, 0x400, 0x6, 0x24, r3}) r4 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r4, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x9, 0x2}}) close(r2) close(r1) 17:56:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xb2950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x3, 0x100, 0xff}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="26000000026f001b0da8885f7cda00"]}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r3, 0x10, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x20040000) close(r2) close(r1) 17:56:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x6c, 0x0) 17:56:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2064.214726][T15012] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:16 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) read(r2, &(0x7f0000000140)=""/43, 0x2b) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) dup2(r0, r2) tkill(r1, 0x1000000000015) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r4, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0xa, 0x2}}) close(r2) close(r1) 17:56:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x6d, 0x0) 17:56:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xb3950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4000) ioctl$IMGETDEVINFO(r4, 0x80044944, &(0x7f0000000180)={0x900000000}) r5 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x24300, 0x0) setsockopt$inet_dccp_buf(r5, 0x21, 0xe, &(0x7f0000000100)="680d171f8141b9316414926bf2fea1eb0399c8f135c54d", 0x17) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="260000000200000036d9af9e4096c874fb34c55380938743f837147bc0007a35c310783f550c240b93a16def7b86542b38fc01c7e5bfcabe6ab0a307c34a9a4e3d6439c8c096f6aa95dd5ea3006a341adf139d1d25f36a4b57800edad67d0c3c7e488a30f9e06927cd547fb5c344d8d08be4130c4e38c718e9609517db7cb2d27c827a6318b2c73146d7afc613b81d4cbc21ef7101ec93aa33c7eae5d0c21694ba762f9adfcf497e18c78de28ce48036c1edbf758b993223858673d169e0001f08fec9595ec3a99692af9cd9b01de1208cb24047cdee5305355645bd32c8"]}) close(r3) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000080)={0x4c96}) close(r0) 17:56:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000140)=0x4) r2 = socket$inet6(0xa, 0x802, 0x0) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0xb, 0x2}}) close(r2) close(r1) [ 2064.803272][T15058] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x6e, 0x0) 17:56:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000140)=0x4) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xb4950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0xc, 0x2}}) close(r2) close(r1) 17:56:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x6f, 0x0) 17:56:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400240) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2065.366558][T15101] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @remote}}, 0x3, 0xfffffffffffffff8, 0x40, 0x1800000000, 0xffffffffffff0001}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000000c0)={r3, 0x3, 0x2, [0xfffffffffffffffb, 0x5]}, 0xc) socket$kcm(0x29, 0x7, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r4) close(r1) 17:56:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x70, 0x0) 17:56:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB="0000100000000000"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0xe, 0x2}}) close(r2) close(r1) 17:56:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xb5950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x180f0000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0xfffffffffffffffd, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) [ 2066.007373][T15148] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x71, 0x0) 17:56:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:18 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x801, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000180)=0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000000)=ANY=[@ANYBLOB="04cfae16d01e43cba09e4803d06e8c6407d2ef766ecc7009e48daf10213055f963fdb61c00000000000000000000000000000000000000000000"], 0x8) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f00000001c0)={0x6, {{0xa, 0x9, 0x7, @ipv4={[], [], @empty}, 0x9}}, {{0xa, 0x4e20, 0x5, @mcast2, 0x5}}}, 0x108) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) 17:56:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) sendmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000180)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000200)="5ae0bc3e1d2a69e0de88e09824ca7d77", 0x10}, {&(0x7f0000000240)}], 0x2, &(0x7f0000002040)=[{0x1010, 0x0, 0x1, "e941cb8f7320c830c524969a9ede5601394e0120fad27b30ea6a2cceb87bfcc07406bc157fb1f2a6aa00dc9f11aa7a3e101bc7a3309f147a5e1dc56368a3f1578b271b25afd6bb472c155274b7d132b7921df8791547fde37ce033382a4a12946b6995cfd15b343e41e150f4d06677eeb0638690f6b1387398c30ef8fe30cc3af6865648ff22ec1beb274a166f8e4a0b661ef57b3fb57f6696465fb894c7d4d191b80ffd8e611f4a2051b51cdc174979fd441d9044f4947abb604baa471a6af660f6135634ea0c3d098c4f59921206d3be4505648ca1ea4d320d6c0b91d2628f1521f4a29c17e5f2248e96745ae33b23e4f9bb76d4199adc3c5d610343b0d691afbd97c18a377bac7f62a825bb5fd682e81c09b67543e3dfc57f9ac6357ead9f8052168f0286b7fb66ac57eb4343152fe3f98d2fe7e992f2c5b3fea6f8706d24d5a3cb637de0bdf59bead006aa3691455dc07d61e2e29f9cd2b6a22fd4a8ac1b391455c7beaf2b571fde30c6df0268e932f62d5a96c906eb55aaee681352a7301f147819fbe8b0d95e9c5cd6e934f5198fc4f144500e02859b7b66e65ad2eddeeedd80ef57f315dab4a3e563f527334083fa171468717d5967bd21a8222ba9ca407db7a02ae908b2e017e3072eae2fba73f957f5ac876139535aa95d1017352c91250afae377036e9c7262ded33e5987fda5bfda3a930cfeab3ea3c8fe09231590d137ecc0b587bdc3addcbad7436637c7a64e8163922629e83bd7953924d3c4083eced323b53a720346df74485b6c013ea3386a301ddabaadc7f9edeea00f268ac4b6cc4d115373d14e9396cac2eee5e4e766ef270d13637dd1342fef99747a86284ff081ab1364c06851410e2baae66a3b344f9a39df15c24bace942dcc3dcefee0cac0b8870b0ec324900128e91b74ce7b8a8b90f630ef724ffc57adb8b8140abeaa11b0c552f9beeef1db78d8980fbe756953654d692bbe7db0fae07bc9faa19cae96f9cb0bf3ab8b1f10e9919592ec70dae52625ca175ee0fe137fbe92640ca42571899a24d619d7019ec5a229c4b86a049af62dd9ab4fb2bf6a5a70fea400ca24e3c59dd2c4f615a80e04783215aad617ce1542f431d0e5724d44139c72edafd826b70d02fb537956aa73ff7910a0ea35a750e026c7f70517147abea82223245d5811510fe49433c53d12ac3f320453a8ae6e8ed90d13251d747a0549da27ca8f126a3b993c526f6f08fc61b5d9790dec534658ad8e35b2e86bfbcca2a3881ca37d6513546c11a37f02d570ba7d67d1ef3969e7b3663ebd842707fb2665b184b36897604fff9c82aa9fb0b20e842be0ccc83baa827e53d1dc4c563a8c39450af154461acf670ecaebb1216f0ef95d77360b2768806692920c543b6ca396ea6e10997023cbb3dd2c5f9152d1479eb320f93651a1f3ec8c783cbecda381179cb76f83dc43d923d995f201ed8e892e558200ac0b9b345ea70097dab8912c39f124e8b65e9070f5a001686d204fcadc186d0aa09cdaa23895f95a581dd6c88b6140886d2787c9edfe24f25afa033e728e20d80688e13bc3ded0b3a5cf44054c55732fb3f6da5b13dadec281aaed81c44f1fe0c844ccca2ce9cbb2f14628a249c6564027a6ed78e1ec3cf77e22cbd09cd71ebfa54b00ce20dbb0726903c7e966b8c496c04e9114c84f782a2045e64974dc20772439dd981d02df719437086a71192af8d78971e6990377f2bef6f4a13ffc99f494f24776f421dd6f097d6f3e0dda1847fe923267538b3293253d46e1620274f9a18fa1034df3c973fd4a1af5524d5d32a9fbb4aba2cb8e43b58765a34f9d061ad4d1356f97919a90d28da7792acb04190a77178edfe9b621816c4e3408badc0a0eec28a7cfe6ae24d81bc2a3d7804dde844ac1b0bc0fa798200a479b70f575eb7e9af12319a0ad9f4ccbf8a73f4ca3149da46ba631d976eeb82df159a0226d3134f6fb0c3c095d1c16a547507f64174697d547b82da6407636f0bf4953240c0d9117ddb57ff70341622ccafdf3c13466d1064af56254a0fd85154309edca6162f54f279e27fd6cec94359fc0714f6b32d16fd309fa8c71e86e05ecd1e37f057e4f3036f01c4bfbd3fe7ba998294c900769b856a39897a0d0348a37dca5dfc941b1d64598a6011f599b2063bc92e6c5ed9111dfa09fd09e6924bf58af11330a257e447e330f8497caa9f0139ef84a8e5a60efa0ac7e627d4bc2419ca0d6a1f10f4063078e2161e61a6cee1fe52e76cb657a22a7ec74fc463f87b9636166f8797430363eae3d344c6655c38b6f283854f9b7c27414fcbf92bf7cdb45170cc15d5f1028d8ca5d32614197595a3b4ac51b238fd577f0ac4d61ba4c66602378dc7eb7d37277705e170098940dc93aaaa3ac792528e1bbb3a4f95e4b755b4d7c24a93aefc2421ec4431856bcd91a8f5f60ea1569cfaa3b7906cffe9771b7540f912023779e39fff3c63f732e96a836a839bf3d152cb928ec594369f6ba4c467f380c45526a86778f491a09e40c639e957a76899042fb1de81e2b3faf8179d888b35dfa176eb9fcb37f4232902d29d9b83c3be1aee02b0736777746c19e91438b824f235ca86694ce5bc186b9218faa7afee9ffa172da5b0954051b57b3cf81e7a3607cf52b35f5d04e60438992aeb5aeb42b136fe4d1d169bb7801fdbb66db0c2e5339dafd221bb69750654d24546fd200da67d637b7b8a41363f2bde58d52e616df1a0fb87d47e75a6249d61f1a47a3b6aaf2f2a523338005bf2092dba93a30208f2b04264c0b5c5134362a342c8a9a2f3936df4b6873e84b21c074be22cab1cc922f1c54cbe644c622d693eed236c826d7c808bf5657a6343c7673edd00b5aa4475044f2e2292fff9ab586c1b84007a3aedd4b9d6ff8dc2036af2f27065168f6ed6bd8b7e1130b54fabf753f51eb27e3e63f59fa78a4793557b0388d0f0d48bdaa7b21e5d04753224b65b26b36ca902b89a8eba34bff3c7f3bf600f10e258a44409bc5f71b705c28ada03bbb606268bd80f18ec4dbc5c67ea79502e231bff8b8d9a967de17d155f1861202114a5f259a88b4297b99a07e33d312b6d9c52b01d3101adaddb5d92a8a2dc0d0ddcabbc9b18c494cb794f2342d89f9f3497071302d2adb2931435067dc7c04e42e4ac172952a36ed883b48baef10b1016f5b294bf78e496fb805c5b6599cc929cef97d9fcce021f484457823a6807f3d04024b0336eebb3a803fa47ea6dcc0743d288aaf072d6c7936bea5de194de62ad21f3464a0de8e9f8dbc243be476f37849b665b2431c473b82f35a29cb4392213c83517c48176dcd83fa6c6ab8a88656e0b3b74707eacfa7db1ecca0969c42200ea1a6029c60dc13622acb3846891ff2748f939ff0ddd0eeb105039e77584d31a593e915c6a7a86048c18f4518b137c22cbbe9ec34aa888982e55e48dd4857b0a364d5e164bde56c800067fc3fba9c4436844019fbc2b19da538cf3d2f958584a05fb25f3a2e717472ad75309461138ca20f2f256b308acffb02ad1befde69b05b0946ffc5cef5241f93f1d00b545dd565df3d2a266f54712760b9d91a4c4aaea721ef946ed6efea61cc2cc295f0668e574bb5f1be29e1505db3bfba2dd77fac2d7758ab2e222192c5321b07025f681a476cb9539de7bdda0801946f6db4fbb1ab146822547228ac076938204ca1d770f3634b885400102d13eb90a0a72f2c7426ec0e6b8e683fb29a043ebc4b4c1313e85eb949a179bc79736af6fb7ef5a83708c5f88a7d5ca698dfd410588936dd8c8390cbcd0bf60192d8fd4ab4acc8f9b4c13a04a796afcc7e69da388094330ab2e76df5016b1da988b87f4cd72835cb8d426c0e946a9798b8b92584e7dacfd140e512b86fd02bbd46404863f3d82963f5ce6207d80f049868e7dc58aea1f1e08b0aba2ed18889e860cdb00225b32e0b37aa80d1004a413a3236f08b33f6eb2d286962eba110b823977f54005a5c9ff3affec88bd32c99531293be2b8c2622cbadf6eee9edd5650fb9ce0ded0a17c360d77560b8b0d1e74765efddb7fdfc26decabb18a425028666bce17f9ceea0bbeeeb734e6682670f4a905cc85a478d67a3599cb19b0588fad166613fd2580a2176e5331cb36a2830194a25a7a6eb72727df1fd7e783b96c488299c39fddb9c2b580a0fd51d03d479c3858d4567f36d332fea7888711c925657978d268acf1ce66309648d70817247311bb383b793504828301ce5fbff623b7659bdbcb40c4027f176e4de388f07888c0617cf9d7ca51feb90b1b85e3c72978e2b4e462525e6f9b283efe09b839f6df6687125bc41d04f7241bbfaaadcd30beeef6af62daad97c6fdd782bb225cf923ca634e48494cb701c95af1dfde713a7595e2540da0b6a9fe316a73deebfbcca991f4dbfedf85e7598c6a6a29adf1036686ed699a6d24a46c585ec9abd130bf260d8891e4232df074a3637393024ac585fa8541c72881efd13c0c0f55cb937ba8d96987c36e4a7624bbe51fc705141e61a215bca0704a06e2419065590dcbdcf608f92c45a4a7d739c5b6d5b6d6113f496d7712df60f2289a746d686e3ff74c218e1abcbe2c61b200a4b582dc711fb2eb0b476aa7f3688f88f30f60560794c08c4462dce154d331da47517a09b3485091b64f352843a45aec4bccab65fe4dc4f05f80586c6c968e1bc99e1d4e206a148f6aee7bdfce4779bccb4adba8f05647bb49814efee087ababd54e0308b92418cd87cfea8d86cce2f75daf7a6f60cebbc10412a8def8c0d5b1afdd0c61f6749953b56cf5fe5911669ad435777b2e5204a689f6f51dd9dbd776f3ee8d83bcddb2f89d03c8978aec2d2b738feb30c5cbdff6af3568fa8a8baea9b0abfbae3222e37645ba485765ea81839b12f0aad5238995bf9ff03b8033b7f38df31aa7aa353147c520f2fb30af65c6f1f99d3ddc4605e94e3afdb657376c5d333f8619c7cfa46387a117e13ece782154d681b87ff520478e66c1d95e1a8f6ea7caf7e41073dd43260702ba9a1689b17b45a24a47fae489e98aa5b45e16d65994d454bc2f24b23e6832e8055e3afdbfb21176266544de254aa22af414d2cafcbd9aaa9a9e140eac57254d8fc2e207c21922318bf931add82e04c8c258d7cb9c0279345e3789479d76e875fb3c685bfdf0ade7c59bed5400dac7c8ba1b5e098ab593e025485e10f39c3959d0cb71a2d44d75aaafe0b5007d5cec4c11e341eef686656fcaa1004174d8034308b0348ae0142489e7a9ffcb746b20b928dd4c440dee053c9e9bd889108229395e6024a01051579eecd86a5c3fcf5704162921240929648d9f88a2ccff6f8f0225384708a96a439552ac42777ecd0f65862cb4f23406739d86cc9d56c35c4a06312365fcd1ff0c2404afec6ae63c534da66172504e6850fb785c87445201fb6906a786b04bc6fc4293b37c45415824f01466113ba17434eee845182fe96cb54a1d5da45bbd0c1ef1b12f5fa1530f3306a262f4bd4e13942ce5d44ac26328632d0c67b3c41768aede33abfb79a61ece54e191cb83249c0dfc072faf7dbeee56a79601951ad4d4913cd17b901a5974eb373957761d7723517e63d4f883874c4779d2dec6384ca601d4cf995dc1458780e13bc885e539bd2086805c425280e1611f133a43e6184366816af09f7e130677471339379b93fedfdb5bc98a62f94297ee8f02564c97991594526b68987b35d7898cb0e6f1b95566f1c8748fb9bc391666ca70ad388e46f71d72a9553216624d868765db588ac41ab4cf3a"}, {0xd8, 0x0, 0x9, "384148068dd8bf6170928cfeb2c03d13e4e48b4d15096358dfcce270062ee3df338f78f6ec6ddd6660bd502d8fa938ec130288030201250ca2c75b11eda1b9eba63894b6df74e0b9d4acedcd188b233d0c58ebbc6a0e575e39e2d907d3b31c8e8a35361233624b0dd4c861194bbc69cc92d86f7e2cdae5893c717ec17afa1c5e39379a55dc779582d1b18c1509d2aaaa623bc5db5f0b59e0fa382dfc7c1ea42483d5e7a4e5216eb0422d48a91b3a7143cd9cac238bcac900921b4c60471284dc0ce909a98fbb11"}, {0xe8, 0x0, 0x1f, "fd08df3653acdc717e79df3ac13ac605dddf4e9ac7400424ddf23e4416b4bb26948395b84b3366b4409babe6ab05ebaae263068c39962004860b45789e7ad062a5d5a5167a8b61df228f24eb0746bd4f27219fc24cdad7addb48f632e3d6133a03157cb80b3429bd08565fb20e35bd120fac08b1ee8ff3df1aa8b74f13093a0e89902e3bfb240bd5a857d3bf12d489d2552e501e8a9c9f9206c91b3ac45730fe6924fa797b7bf7417eab37a961c48a9ff760305c3987dc4ba58563dceedaad4dcbc63ab1c157e6f915b92270856ec1cbe9a4"}, {0xf8, 0x113, 0x80000001, "e3ac14d1ec6e3184f03f1dd08c18a22ee8f5065ae35a070684999e88a2542f3a880c64b4945155065f618897083df3d3d2d8789315f264f260b5a8c0a6748425635faadd1ac1e586fc057887fdcdfe8d15ee8558ca466d2b87aee51e4798ea8abdbecf179c90629c749a48ceea1269783a28117e130796b6ac1cd5d1f9ff12b519e91451059610c3421266e01c645a312088260e3d4b8c0b8edec48d66bf822cc47b429223bef90e69250d174c4a83151769ee9c6bb798d45a1711d3f7b815206b38b3776a6982020df7ff19f7e7a9f55692d8e0db39476f0d546f9574c612a2f96156"}, {0x18, 0x104, 0x10000, "aa3b1b"}, {0xc0, 0x115, 0x0, "91c7ad8853b2666940b56020d935f99c735d7f311746f722a5b4d04ad0ada9ea636587205ac2da909654d9c8817fb6fdc1daee8517ffa1e78646dd6a0f320b32fa4402cf32de31598e4d20616e7f59cd447c5b280a85ce5a1f48098fa23777bb559a792218dfb786ebe593cd739933c12b30a2931979d099205b76f146456a391bbd0f7258717cbd5b85861096e7dd1098feddf103b3b155552a74020186291b9b43f8ddc7d9d45974f18b27b675"}, {0x58, 0x11, 0xca15, "0554e1c488e7aff058ba2de479fe4bda27f8451f579146e036c02d848e4e1745cbf83fdad52c31eabf710f9d0c0a98419ecfbf63a45387d6beabab50e55cbb69e014e23a26"}, {0x48, 0x117, 0x6b688970, "641cdbd8723c0209d3bc293c13fa51cd72c7a42c91c1731ae7327c81790e6d74025ce751b6fc626de1f95e2c5d6d90aa0ea6b5bfc8c1f9"}, {0x108, 0x6, 0x2, "c52da6dd3ee504e1a853a23e7c68801663603fd41f56bac950ccfacec00703d3f7c861171e399be0f2ec18671222d6155a6a2aa07e2d64ea7562d653cedd73760f91e24ad10591b0bf78e7c53fa883841c244151ad90cb163bb070087a0e26e89ad00dcb4d319ea0e21d13d69c94d162629b5fa40268506915c3b99f9cb0af9a51282a81ccabf88195028643cd171856a4fcf91fd57f8a255fda88dd5f1ff63a87630a47971edb5896a3d07c944dca64d6b39a3aed3d73a455c9d30522f9877085b8b33c2083a2f60e3f0743acc14fd24c8487148ceaa76c8cd5c9213b2df23876671d3604719cac625640d0f10e833486a55548"}], 0x1548}, 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0xf, 0x2}}) close(r2) close(r1) 17:56:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xb6950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2) 17:56:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000140)=@srh={0x2197b63b3969d750, 0xe, 0x4, 0x7, 0x1, 0x40, 0x54, [@remote, @local, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, @mcast1, @mcast2]}, 0x78) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2066.502699][T15193] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xb7950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x10, 0x2}}) close(r2) close(r1) 17:56:19 executing program 5: socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2066.857841][T15217] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80000, 0x0) write$ppp(r2, &(0x7f0000000140)="d020e6661e0cec00e0452fc72008b01320ca53a77f3563c062bde8ed83d31c8334af91ac0a5ebf0105f6b5d8759c88ace00609ff0ad6cc6caac3809bfe8a067d07a5996e21ddb0173495ffadd02ad5b49962dc0f067bba3932652ae31bf192cce4be5a46065ec6db06bce6ebeec7f09be95a1eb4caaae13761de73e0209a81edd036374d63035295b28244b5981a39beb157cd08fc105a232235d92cd4117c35ee0125ff3496620a0a455001998d7b931b85536fc06f29a63fbf4337261aa8c3abcde27834eb66ad5e7d26f39646b1f9766b0441d289e64ea539c108473f", 0xde) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r3) close(r1) [ 2067.115741][T15241] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x11, 0x2}}) close(r2) close(r1) 17:56:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x3) 17:56:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=""/138, &(0x7f0000000000)=0x8a) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) lseek(r1, 0x0, 0x3) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xb8950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)=0x76ff) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000280)=0x3, 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="260000000200b9a007606df2c0d9f69ce420bc02a6800c3c32735f63ce1d334f601f1a4f1ddad201e01a9913af82095b89c4d407261eb40f704cf795f7dad716a3cfe1741a6b30963306da87fd9ab659d8dc7e4ddbfe8c0e51a18f3ac5f5ee6ad816a561cc3b76e7ad3d9c401065096a561d2d6355"]}) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x802, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r4, 0x81785501, &(0x7f0000000140)=""/87) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @local}}}, &(0x7f0000000000)=0x84) ioctl$DRM_IOCTL_MODESET_CTL(r4, 0x40086408, &(0x7f0000000200)={0x681, 0xb23}) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000001c0)={r5, 0x7, 0x3, 0x3}, 0x10) close(r3) close(r2) [ 2067.434803][T15265] netlink: 'syz-executor0': attribute type 22 has an invalid length. [ 2067.645601][T15288] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x12, 0x2}}) close(r2) close(r1) 17:56:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) socket$inet(0x2, 0x2, 0x4) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x70, 0x100000001, 0x80000000, 0x200, 0x400, 0x0, 0x401, 0x1, 0xd, 0x16f4, 0x0, 0x7657, 0x2, 0xe6e, 0x4, 0x1, 0x80000000, 0x0, 0x2, 0x3c9, 0x3ff, 0x1, 0x9, 0x7, 0x3, 0x2, 0x1, 0x1f, 0x80000001, 0x7fff, 0x4, 0x211, 0x2, 0xe2f7, 0x4, 0x95d, 0x23, 0x0, 0x8, 0x6, @perf_config_ext={0x1, 0x4e}, 0x1024, 0x1f, 0x8, 0x1, 0x8001, 0x2, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) r2 = dup3(r0, r1, 0x80000) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e21, @multicast2}, 0x1, 0x4, 0x4}}, 0x2e) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) unlinkat(r2, &(0x7f0000000140)='./file0\x00', 0x200) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r4) close(r3) 17:56:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x13, 0x2}}) close(r2) close(r1) 17:56:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/current\x00') ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000140)) r2 = socket$inet6(0xa, 0x802, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000300)={0x1, 0x0, [{0x1f000, 0x58, &(0x7f0000000280)=""/88}]}) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xb9950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x4) 17:56:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000140)=""/241, &(0x7f0000000000)=0xf1) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2068.525830][T15338] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x14, 0x2}}) close(r2) close(r1) 17:56:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB="00000000000e0000"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xba950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:21 executing program 5: socketpair$unix(0x1, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000002"]}) close(r2) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000000)={0x9}, 0x4) close(r1) 17:56:21 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x2040) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0xc0c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000180)={'mangle\x00', 0x62, "7974c3b2877bb95b29e490320ed8264fba5714c71d8c04c7377db633a563663b125f47c3902c562470d1d7a8359277974c263f3c74501edc826b5218e9d7fbcad847c50ae93cbe58197ecd4d1103025bfb496211d9c3a3d7f1a5275a7aecda4ee3ab"}, &(0x7f0000000240)=0x86) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB="000700b100000000"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x5) 17:56:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x15, 0x2}}) close(r2) close(r1) 17:56:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xbb950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = timerfd_create(0x0, 0x800) r4 = fcntl$getown(r2, 0x9) fcntl$setown(r3, 0x8, r4) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0xc70, 0x4) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0xa, 0x1, 0xc3, 0x5, 0x2b}, {0xc0000000, 0x2c00791e, 0x4, 0x8, 0x7fffffff}]}) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r5) close(r2) 17:56:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x7) 17:56:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2069.455527][T15409] validate_nla: 1 callbacks suppressed [ 2069.455537][T15409] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) finit_module(r0, &(0x7f0000000240)='@/}\x00', 0x3) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x20000, 0x1) connect$caif(r1, &(0x7f0000000200)=@dbg={0x25, 0x8000, 0x6}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80f, 0xffffffffffff8001) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) fsetxattr$security_smack_transmute(0xffffffffffffffff, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0x20) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$RTC_WIE_OFF(r3, 0x7010) 17:56:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x16, 0x2}}) close(r2) close(r1) 17:56:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) r3 = accept$inet6(r2, 0x0, &(0x7f0000000000)) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) close(r2) close(r1) 17:56:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xbc950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x17, 0x2}}) close(r2) close(r1) 17:56:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x8) 17:56:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x50002, 0x80) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000180)=r3) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2070.148998][T15457] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x88a40, 0x0) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000080)) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000140)='/dev/rtc0\x00', 0xa, 0x1) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r3) close(r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000180)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x20) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000200)={r4, 0xa6, "2d15c09846426f602ac739b55474bdf54cdbf0cc3b0e30ff02237b847b113c754cd5d926e6a90ae6067253a819f22222aa6318708fda279ec53242f4a0b6a85ad6a68ad9eb7265b326da9923c457e05881aad44f88ca4798287fd30f5a705ff9d2904e485e2f3338d099daccc8543fd6a84551eaee7299ae846c3ef6356bfee8548ef59045dadc548185b5a0c87ef26fababda943345c82c60b71b3f247d4bda6fbecb88f690"}, &(0x7f00000002c0)=0xae) 17:56:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x18, 0x2}}) close(r2) close(r1) 17:56:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xbd950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80003, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0xfffffffffffffffd}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) [ 2070.640909][T15499] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x19, 0x2}}) close(r2) close(r1) 17:56:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x9) 17:56:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa, 0x28}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000000)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26}}) close(r2) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x101, 0x40000) ioctl$KVM_REINJECT_CONTROL(r3, 0xae71, &(0x7f0000000080)={0x92c}) close(r1) 17:56:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xbe950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:23 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x44d96c08, 0x0, 0x80000000, 0x1}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000200)={r1, 0xab4f, 0xda, 0x40, 0x73d}, 0x14) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000140)={r0}) getsockopt$inet6_buf(r0, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x1a, 0x2}}) close(r2) close(r1) 17:56:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2071.138051][T15538] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) flock(r0, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0xe) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) inotify_add_watch(r3, &(0x7f0000000180)='./file0\x00', 0x1000000) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x10000) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="1a3e595709ff00dfd86a4b49fe586bd7d441537e220b7e45080d373e83dcc0e0a9999bbcf53f17019145f2b7b7c326f7c13188fd196c57ba7649f0c9209efeddfcfafea84c35853cda6540119c875bde87b2b3dc9d0bfff9ffd4a043855f3c7a55ac96a326077fad4ee29f084351b7a0cbf9b67256a1552883240e12bcb8651fe6d7c7b5cbe3e178b0174d19c54febace3df0e58678ee8a0d4cf202a81ef178a4818a3cfd28858768c4f5f1d24f16859e4fc8e828f5d52bf54ecb6dd7de10de5ff56"]}) close(r2) close(r1) 17:56:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xa) 17:56:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x1b, 0x2}}) close(r2) close(r1) 17:56:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xbf950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0x4a) 17:56:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000000c0), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="2600000002000000dac3ae3b4dff1c23024f0ac363f5aa948cbf8692cea884ff3427c033ab799de869f7ec95c5a24684a7e7e20170fbf54e785ffc0fa42a0d1636052678e61e92acb6a1703d4accd68da66349dc93d981e76422354566fbc6877cf6926baf3d5d4691637b975ec4549fbc23af1f3334f2679d9929847251d668fbfa0bf8b925ad22105c459ece82d00a2e5b74a806d8"]}) close(r2) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x20000, 0x0) ioctl$NBD_DO_IT(r3, 0xab03) close(r1) [ 2071.753072][T15589] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000003, 0x810, r1, 0x0) 17:56:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x1c, 0x2}}) close(r2) close(r1) 17:56:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf4ffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) connect$vsock_dgram(r3, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) close(r2) close(r1) 17:56:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xc0950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000000)=ANY=[@ANYBLOB="cd3df73b95c059550000000000000000"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2072.247038][T15622] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xe) 17:56:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x1d, 0x2}}) close(r2) close(r1) 17:56:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000140)={@empty, @dev, 0x0}, &(0x7f0000000180)=0xc) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000001c0)={@rand_addr="fe2cc821678fe403b79e124ff8d3c867", r2}, 0x14) r3 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) r4 = request_key(&(0x7f0000000240)='cifs.idmap\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='\'\x00', 0xfffffffffffffff9) keyctl$describe(0x6, r4, &(0x7f0000000300)=""/213, 0xd5) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000200)={0x41, 0x2, 0x3}, 0x10) getsockopt$inet6_buf(r3, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x9, 0x10000) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x90002, 0x0) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x2, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xb) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="208c732196a29939"]}) close(r3) close(r2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'ip6gre0\x00', 0x1702}) fstat(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r4, r5) 17:56:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="99ebc5c42c7d44e3c5379c596b448a15d9aed2189d31e19dd7d3a7bf40deb2c89717a135194517bc0d70528bc229bf13a8aa58abc4b0f86aa6f95c8d8d820781c5c2dbe30f107bea346257e4d9879d5cb4b4a5a00bf3ea315c0d050a5da74c463cea208aef392677c2890bc9c5753e14ed78b8efa3d886f7c224c4464213fdf3e02287e09b138e3b9a678aa65986640a9f6752ffadae5495d6fd1a958e5f926fde76ff07d052bb1b7d3ea8abe07018d26c5353fa4a0c86000a9193d50000000000000000000000000000"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2072.567402][T15651] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x1e, 0x2}}) close(r2) close(r1) 17:56:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xc1950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) pipe2(&(0x7f00000002c0)={0xffffffffffffffff}, 0x4000) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000300)=0x6, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r4, 0x8250aea6, &(0x7f0000000140)=""/209) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="2600000002000000ab2581298c78842ef1eabdc772cbfcd6564b86fb11"]}) close(r3) close(r1) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000240)={0x13, 0x7ff, 0x0, 0x7, 0xc3e, 0x8}) r5 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x40800) ioctl$UI_ABS_SETUP(r5, 0x401c5504, &(0x7f0000000080)={0x5, {0x687, 0x200, 0x3, 0x40, 0x1, 0x2c}}) 17:56:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) munlockall() r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2072.843447][T15673] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xf) 17:56:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x21, 0x2}}) close(r2) close(r1) 17:56:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xc2950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) name_to_handle_at(r2, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x1e, 0x6, "c2be3ea5807d2918ae123a3ee22a8fc09d4ae1377598"}, &(0x7f00000002c0), 0x1000) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000140)={0x2, 0x3, 0x4, {0x2, 0x4, 0x81, 0x1}}) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB="0000800000e4a2a3"], 0x8) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000180)={0x7, 0x0, [], {0x0, @bt={0x8, 0x35, 0x1, 0x2, 0x1, 0x4, 0xffffffffffff0000, 0x58daee6f, 0x1, 0x1, 0x5, 0x7, 0xac, 0x3, 0x1, 0xc}}}) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) close(r1) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x101801, 0x20) ioctl$KVM_GET_SUPPORTED_CPUID(r4, 0xc008ae05, &(0x7f0000000140)=""/157) close(r3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x48, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x5, @mcast1, 0x10000}, @in6={0xa, 0x4e24, 0x7, @empty, 0x2}, @in={0x2, 0x4e22, @loopback}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000280)={r5}, &(0x7f00000002c0)=0x8) close(r2) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000300)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/255, 0xff}, {&(0x7f00000004c0)=""/22, 0x16}, {&(0x7f0000000500)=""/238, 0xee}], 0x4, &(0x7f0000000640)=""/185, 0xb9}, 0x10000) 17:56:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x23, 0x2}}) close(r2) close(r1) [ 2073.356050][T15716] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000140)={'security\x00'}, &(0x7f0000000000)=0x54) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x10) 17:56:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x24, 0x2}}) close(r2) close(r1) 17:56:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000140)={0x100, 0x0, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xc3950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="ea26000100000000ac952a91125a16912dd1e0768b51cb47fc16ce7d5773b8ee6d8b39cdcf3871923987db6770aa81633f1c0700d2c7a7e053b7f7789663e8bb015e8f9918df7d4c41ce0d104cfa2538c3084e2f7f248e30e949a59657698c272e582c261bd27b6653746af226bf09052ab9ff6160bc384df8a5a245a2d737cc97aa1fda3db7fd5b3ef8ca4c947b4f66fddf5666f62a898c00d22e1e386dcdf0350afd62a771d1d39a3ec25afd78ca1e"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2073.849059][T15757] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'veth0_to_hsr\x00', {0x2, 0x4e23, @remote}}) 17:56:26 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x80, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x94, r4, 0xa00, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7b60}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xff}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000000)={0x2, 0x2d, "5e5ab355cee7291cf958d860bc207734d8607e75390fd059b38901a666a71e38f98b4a4dcb8db5274146865521"}) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xc4950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x25, 0x2}}) close(r2) close(r1) 17:56:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x11) 17:56:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000000)=ANY=[@ANYBLOB="000080005453965ebf97be54240d7baf7946b8cd01e538d5"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup2(r0, r0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) bind$ax25(r1, &(0x7f0000000140)={{0x3, @default, 0x8}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default, @null, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x802, 0x0) socket(0x1d, 0x3, 0x7) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) [ 2074.544077][T15808] validate_nla: 1 callbacks suppressed [ 2074.544086][T15808] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xc5950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400000400201) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000080)) close(r1) 17:56:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='net/i\xba\xefQ\xce\x1d\xa5\x94-v4`\xb2o\x9b\xb4gmp\x00\x1aUE2\xe3\xe7\";\xdcr|UM;\xd1\xce\'^\xa8n\x03\v\xbf\xdf\x17|c\xb1\xf1\x0e\x1e\x95v \x8c\xcf\x89\xb9\x82\xe4\xb6\x89') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000002c0)={0x20000000000001da, &(0x7f0000000380)=[{0x0}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000300)={r2, 0x20}) r3 = accept$inet(r0, 0x0, &(0x7f0000000000)) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000280)=0x20000, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000005c0)=@assoc_id=0x0, &(0x7f0000000600)=0x4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000640)={r4, 0x9f, "3773009c560352d863c4674e41445ebea5c6ad9dbc3404c45839b15e0773ac5ac00af14ce0eb17be29c2bfbf1ea4f4a8c9886f7e1a6f1e30d141d89d0adcd7bfa303349fe930ec8522ad7602f1ece5e7bfc778c1266bdc79ce5d32b10452d3899f873942969902228ac6cdaf9f8ee882deb45c6dfe082e8ad7c5a701e2ef0015b463e1678d4523b325c1f3919ce867de296e7975cbfc8a0618edb92d9423f0"}, &(0x7f0000000700)=0xa7) connect$l2tp(r1, &(0x7f0000000580)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @multicast2}, 0x1, 0x4, 0x2}}, 0x2e) getsockopt$inet_tcp_buf(r3, 0x6, 0x1f, &(0x7f0000000140)=""/152, &(0x7f0000000200)=0x98) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000003c0)) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000400)=ANY=[@ANYBLOB="0082bb7b6861d2c2ba5baad486c1e7ee3e3dc0d6033748ba92a4d5796b4cc66f4a3e9ec2b126546492785c7835567508b3b40b0d90f56dfb02c6ab6618727b362bd5b45ea3893ecb9f43700311024a5a8d8cc6094279487906d0a30f70f4e1ffc65d26bf8f19b84ef4db5cc04686f174"], 0x8) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snapshot\x00', 0x20000, 0x0) accept4(r0, &(0x7f0000000500)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000240)=0x80, 0x80000) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2074.808612][T15828] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x23) 17:56:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xc6950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x101200, 0x0) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000180)) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$NBD_SET_SIZE(r3, 0xab02, 0x80000001) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000240)={0x1, 0x0, @pic={0x1, 0x1, 0x101, 0x41, 0x80000000, 0x9, 0x100000001, 0x3, 0x0, 0xbcab, 0x5, 0x401, 0x7fffffff, 0x8, 0x3, 0x3f}}) getsockname$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x8000) mq_timedreceive(r3, &(0x7f0000000080)=""/65, 0x41, 0x5, 0x0) 17:56:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x27, 0x2}}) close(r2) close(r1) [ 2075.240880][T15862] Unknown ioctl 1074048665 [ 2075.287210][T15862] Unknown ioctl -2113360285 [ 2075.294264][T15861] netlink: 'syz-executor0': attribute type 22 has an invalid length. [ 2075.329293][T15872] Unknown ioctl 1074048665 [ 2075.342557][T15874] Unknown ioctl -2113360285 17:56:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x25) 17:56:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x9c, r2, 0x624, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7fc00000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffffffffffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4}, 0x20000040) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r3, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x29, 0x2}}) close(r2) close(r1) 17:56:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="2600000002000020"]}) close(r2) close(r1) 17:56:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xc7950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2075.763560][T15910] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0x3f, 0x0, 0x10002, 0x100000000}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xdc, r2, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_NAME={0x8, 0x1, @l2={'ib', 0x3a, '\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x3f, @empty, 0x5fed4c51}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x7fffffff, @empty, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x9, @rand_addr="03e35fa950ce8f0eab6d6a1e41835b6e", 0x400}}}}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x4004}, 0x4) r3 = socket$inet6(0xa, 0x802, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000001440)=0x4) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000001500)=ANY=[@ANYBLOB="0000000090009805e152083a0000f4c428515fe853ff354af6b8126f889dd8c2ab5cbc988537f2bf618e1f1900657887be5355e3e680ea99af305f9f98e014e7af6fadfe2a134cae7a3d2fc1c7aa7daf53989ef6c0496e87e17ebbbf66299afb746ce15d00abbeb13485a7cae8f4605de0dd85afd99d96b4066b9942502c5950322e7e85761f6477499c328ed75fa5738e9575f5c729e317c9296439f1"], 0x8) getsockopt$inet6_buf(r3, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000003c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000001400)={r4, &(0x7f0000000400)=""/4096}) 17:56:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="2600000a4f99bc00f05dcd79fd"]}) fchmod(r0, 0x4) close(r3) close(r2) 17:56:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2a, 0x2}}) close(r2) close(r1) 17:56:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000200)=""/164, &(0x7f0000000100)=0xa4) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) 17:56:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xc8950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x26) 17:56:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast2, @remote, @mcast1, 0x5069, 0x200, 0x8001, 0x500, 0x5, 0x400010, r3}) close(r2) close(r1) 17:56:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff4, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2076.407036][T15953] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2b, 0x2}}) close(r2) close(r1) 17:56:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000340)={0x0, 0x0}) r3 = syz_open_dev$media(&(0x7f0000000380)='/dev/media#\x00', 0x9, 0x101200) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x3f, 0x1213, 0xfffffffffffffc00, 0x401, 0x0, 0x4, 0x40000, 0xd, 0x1, 0x10000, 0x5, 0x5, 0x6, 0x101, 0x7fff, 0x8001, 0x0, 0x10000, 0x5, 0x47ec, 0x80, 0xfffffffffffeffff, 0x0, 0x100, 0x401, 0x1, 0x3, 0x3, 0x90, 0xff, 0x6, 0x8001, 0x800, 0x1000, 0x1, 0x3, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000000), 0xa}, 0x1, 0x5, 0x2, 0x7, 0x400, 0x3, 0x6}, r2, 0x0, r3, 0x3) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB='\x00\x00\x00\b\x00\x00\x00\x00'], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) write$FUSE_DIRENT(r1, &(0x7f0000000140)={0x88, 0x0, 0x4, [{0x1, 0x5, 0x20, 0x1, 'vboxnet1vmnet0*trustedvmnet0proc'}, {0x1, 0xffffffff00000000, 0x0, 0x2}, {0x2, 0x3f, 0x9, 0x7, 'bdevself%'}]}, 0x88) r4 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x5, 0x80801) write$cgroup_subtree(r4, &(0x7f0000000200)={[{0x2f, 'rdma'}, {0x2f, 'memory'}, {0x2b, 'memory'}, {0x2f, 'io'}, {0x2b, 'memory'}, {0x2b, 'pids'}, {0x2f, 'memory'}, {0x2b, 'cpu'}, {0x2f, 'io'}, {0x2d, 'memory'}]}, 0x41) 17:56:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xc9950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:29 executing program 5: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) epoll_create1(0x80000) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) close(r1) 17:56:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2c, 0x2}}) close(r2) close(r1) 17:56:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x4e22, @local}}) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2076.935395][T15995] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x27) 17:56:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:29 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xca950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2d, 0x2}}) close(r2) close(r1) 17:56:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm-monitor\x00', 0x428002, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f00000009c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000c80)=ANY=[@ANYBLOB="000000006c26da8a94805d2dd046398d04ac5829db96c0af889bed0eb6e9", @ANYRES16=r2, @ANYBLOB="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"], 0x2a4}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6cef91d35bdce991) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) getsockname$packet(r1, &(0x7f0000000ac0)={0x11, 0x0, 0x0}, &(0x7f0000000b00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000b40)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000c40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x500888}, 0xc, &(0x7f0000000c00)={&(0x7f0000000b80)=@mpls_getroute={0x70, 0x1a, 0x1, 0x70bd29, 0x25dfdbfe, {0x1c, 0x10, 0x20, 0xd0, 0x0, 0x0, 0xff, 0xb, 0x200}, [@RTA_OIF={0x8, 0x4, r5}, @RTA_OIF={0x8, 0x4, r6}, @RTA_DST={0x20, 0x1, [{0x1, 0x5, 0x800, 0x2}, {0x3, 0x0, 0x7ff, 0x56e9c615}, {0x2, 0x4, 0x1, 0xffffffff}, {0x101, 0x7, 0xffff, 0x3}, {0x7, 0x7, 0x8, 0xaef}, {0x7, 0x1, 0x8, 0x4}, {0x0, 0x8, 0x25be, 0x4}]}, @RTA_DST={0x24, 0x1, [{0x7, 0x4, 0x80800000, 0x80}, {0x7, 0xfff, 0x9, 0x4}, {0x200, 0x1000, 0xc, 0x3f}, {0x3f, 0x71, 0x2, 0x3}, {0x248e, 0x6, 0x9, 0x1ff}, {0xe2, 0x1, 0x8, 0x2}, {0x0, 0xfffffffeffffffff, 0x2, 0x1}, {0x1, 0x4, 0x7e, 0x1111}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) getpeername$unix(r3, &(0x7f00000002c0)=@abs, &(0x7f0000000000)=0x6e) llistxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/160, 0x254) r7 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB='\x00'], 0x8) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r4, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)={0x1d4, r8, 0x601, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xdc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x60c0}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8b}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb92}]}, @TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x800}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x17}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5dde4efc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}]}, @TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffff000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000001}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x40001}, 0x20040004) getsockopt$inet6_buf(r7, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000140)=0xa4) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000a00)={0x0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e21, @broadcast}, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x8, 0x28}) 17:56:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2077.448009][T16035] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xa400, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r2, 0x4) r3 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r3, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:29 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) socket$inet6_sctp(0xa, 0x5, 0x84) 17:56:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x29) [ 2077.638152][T16035] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x30, 0x2}}) close(r2) close(r1) 17:56:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xcb950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0xfffffffffffffffd) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[], 0x0) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2077.996174][T16081] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) r3 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@remote, @in=@multicast1}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) getgid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20, 0x1, @empty, 0x3}, 0x1c) listen(r4, 0x20000003) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0xc, 0x0) write$P9_RRENAME(r5, &(0x7f0000000100)={0x7}, 0x7) sendmmsg(0xffffffffffffffff, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)}], 0x1, &(0x7f0000000580)}, 0x6}], 0x1, 0x8000) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="e7ffffffffffffff"], 0x8) connect(r6, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r6, 0x800448d2, &(0x7f0000000280)={0x2, &(0x7f0000000140)=[{}, {}]}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000001180)) dup3(r6, r5, 0x0) fstat(r0, &(0x7f0000000280)) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) fstat(r3, &(0x7f00000003c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@dev, @in=@initdev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000005c0)=0xe8) fstat(r2, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) getgroups(0x3, &(0x7f00000007c0)=[0xee01, 0xee00, 0x0]) geteuid() 17:56:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x31, 0x2}}) close(r2) close(r1) 17:56:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2a) 17:56:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xcc950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) close(r2) close(r1) 17:56:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x32, 0x2}}) close(r2) close(r1) [ 2078.660594][T16128] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:31 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r0, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xcd950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2b) 17:56:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x33, 0x2}}) close(r2) close(r1) 17:56:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000840)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x628, 0x3f8, 0x2e8, 0x2e8, 0x0, 0x0, 0x558, 0x558, 0x558, 0x558, 0x558, 0x5, &(0x7f0000000080), {[{{@ipv6={@mcast2, @loopback, [0xff0000ff, 0xffffff00, 0xffffff00, 0xffffffff], [0xffffff00, 0x0, 0xffffffff], 'teql0\x00', 'tunl0\x00', {0xff}, {}, 0x11, 0x0, 0x3}, 0x0, 0x180, 0x1b0, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x4, 0x1, 0x9, 0x1}}, @common=@srh1={0x90, 'srh\x00', 0x1, {0x3a, 0x8, 0xffffffffffffff7f, 0x101, 0x4, @local, @remote, @mcast2, [0xff000000, 0xff0000ff, 0xffffff00], [0x0, 0xffffffff, 0xff, 0xffffffff], [0xffffffff, 0xffffffff, 0x0, 0xffffff00], 0x2008, 0x8}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0xee0, 0x5, 0x100}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x5}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x6, @ipv4=@loopback, @ipv6=@ipv4={[], [], @multicast2}, @gre_key=0xffffffffffff8001, @icmp_id=0x67}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x15, @ipv6=@rand_addr="2ad772cca3c34bacfc34abbe26e8d952", @ipv6=@local, @port=0x4e20, @gre_key=0x800000}}}, {{@ipv6={@loopback, @empty, [0xffffffff, 0xffffffff, 0xff000000], [0x0, 0xffffffff, 0x0, 0xffffffff], 'eql\x00', 'rose0\x00', {0xff}, {0xff}, 0x21, 0x80000001, 0x2, 0x40}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @common=@eui64={0x28, 'eui64\x00'}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x9, @ipv6=@mcast2, @ipv4=@multicast1, @gre_key=0x3ff, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x688) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000000)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26}}) close(r3) close(r1) 17:56:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80004000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x70a, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}}, 0x10) r3 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r3, 0x29, 0x40, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0x266) 17:56:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x8080e, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="08000000000000035ea2d8e6f5eda147b8f7ac524ace487c339c97eee6746308b22f2824751a74e7fd0641f7b346e7640e7b9dad8866b0f844ca2c09e69857cb8fc1e7a1c54479cd1d3fd22c499517dfc4077c6ee5fc04bdf3253c89d997e83b707b0780f72f5ea522841a5dd30866908cf4f3d72f1f704c0fc40f8d35e9"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xce950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200, 0x100) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x9}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000200)={0x1, 0x5, 0x8, 0x8d1, 0x2, 0x460f, 0x10000, 0x0, r3}, 0x20) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="260000fcd522c00a57906dbe320002000000"]}) close(r4) close(r2) 17:56:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x60) 17:56:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 2079.744855][T16212] validate_nla: 1 callbacks suppressed [ 2079.744873][T16212] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:56:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) ioctl$int_out(r1, 0x5462, &(0x7f0000000000)) close(r2) close(r1) 17:56:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:32 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x410000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="000000fafb70b8050000000000"], 0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xcf950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x38, 0x2}}) close(r2) close(r1) 17:56:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f00000000c0)={&(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x17}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000440)) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000400)) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) write$P9_RSTATu(r2, &(0x7f0000000300)={0x8b, 0x7d, 0x2, {{0x0, 0x74, 0x1, 0x2, {0x44, 0x0, 0x2}, 0x0, 0x7, 0x7e0, 0x4, 0x6, 'md5sum', 0x12, '/dev/snd/pcmC#D#p\x00', 0x17, 'nodevsystemmd5sumuser&+', 0x12, '/dev/snd/pcmC#D#p\x00'}, 0x2, '!-', r5, r6, r7}}, 0x8b) close(r3) 17:56:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x1f4) 17:56:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2080.344217][T16258] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9, 0x8000) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x39, 0x2}}) close(r2) close(r1) 17:56:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x28000) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000140)=0x43) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xd0950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x300) 17:56:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="2620000002000000"]}) close(r2) close(r1) [ 2080.948605][T16306] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001740)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}}, 0x10000, 0x1d1c3974, 0x7, 0x9, 0x1000}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="2a000000d19c9b4b289f543ee2d27a6f0f7d49085eadc2e9c418c2da27656a3ce58c897ef73a3735bdeced04964ebadd"], &(0x7f00000002c0)=0x32) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001780)={0x0, 0x40004000000}, &(0x7f00000017c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001800)={0x0, 0xd5, "e3c5f912b6589341011a3d6ec786f81613b9061f88d2cdc6f28d7fdb9ccb2de83eb328cb021d96dfbb915daa27122223c4051b61a5f6fd40a9deb48735c5b51e976a949d3b36d03aed1612e915dfd1f74a567a87ba1cc7f4037252f35f45e36fb044cdc0acb506b9d62c3f68687e3182a6f243b9532bd6be567464e5557a26753b73ab01452f1997a5117837dd1e8cdd0bd9d0f58a51b8f83d778bc07adf7b70d29f8e004e0fed4af209d3f8043a503113967cc7e7498eb7671d6b42eb3ec9fbb3f9a437f3acc4ed83bccfc4e7359e65f1e7e21034"}, &(0x7f0000001900)=0xdd) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001940)={r3, 0x638, 0x80, 0x9, 0xfffffffffffffffe, 0x9, 0x101, 0x80000001, {r4, @in={{0x2, 0x4e21, @loopback}}, 0x4, 0xffffffffffff2ea4, 0x101, 0x484, 0x9}}, &(0x7f0000001a00)=0xb0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x802, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000000)) listen(r5, 0x7) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000, r1}) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB="00274c8ef7000000"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x5d, &(0x7f0000000040)=""/164, &(0x7f0000000280)=0xffffffffffffff25) 17:56:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) unshare(0x100) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="1800000002000000"]}) inotify_init() close(r2) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f0000000080)={0x7, 0x1f, 0x1}) close(r1) 17:56:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3a, 0x2}}) close(r2) close(r1) 17:56:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xd1950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:33 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2081.476950][T16346] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3b, 0x2}}) close(r2) close(r1) 17:56:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x3a5) 17:56:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000000)=@routing, 0xfffffffffffffd2e) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xd2950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x1}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x3e8) [ 2081.927572][T16383] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x800000000802, 0x9) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) ptrace$setsig(0x4203, r2, 0x6, &(0x7f0000000180)={0x19, 0x400000000000000, 0xff}) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@routing, 0x6e93736df4972b75) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000000)=0xa4) 17:56:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3c, 0x2}}) close(r2) close(r1) 17:56:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000013000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$int_out(r0, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r3) close(r2) 17:56:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xd3950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB="0e00000008000000"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3d, 0x2}}) close(r2) close(r1) 17:56:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2082.499576][T16427] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x449) 17:56:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000140)={0x1, {{0xa, 0x4e21, 0x2, @mcast1, 0xf}}, {{0xa, 0x4e23, 0x1ff, @loopback, 0x4}}}, 0x108) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x200400, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40800, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x2, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x10000000004001fe) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f00000000c0)=0xfffffffffffffffc) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="200080000600000000310231f79d351c2c7ef744b5018238260884f407a728db95893eb39df8d3a6575c031e029b3241bd1037c1f7fad648a883997d937f65706693cae558bfff3f126d22480932b70912756ec23268e5dc6c2a7fa0c2c6d42ab654677519477990de1656ccbe942de0fb0dbd947e27838aff8912e0986d7c1c2fbe8dd27596163ede5ca662e6817a0fa71b0101659b1ee4f0024ea8b1739b0d5267f3232f6277"]}) close(r3) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000100)=0x4, 0x4) close(r2) 17:56:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xd4950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3e, 0x2}}) close(r2) close(r1) 17:56:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x8) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) capget(&(0x7f0000000000)={0x200f1526}, &(0x7f0000000140)={0x4, 0x2, 0x80, 0x34de, 0x2, 0x1}) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x100000000, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000240)={@multicast1, @initdev, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000037c0)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f00000038c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000003e80)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000003f80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004040)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000004280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000004240)={&(0x7f0000004080)={0x1a4, r3, 0x20, 0x70bd2b, 0x25dfdbfc, {}, [{{0x8, 0x1, r4}, {0xfc, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x801}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x27c8}}}]}}, {{0x8, 0x1, r6}, {0x4}}, {{0x8, 0x1, r7}, {0x78, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x80}, 0x40000) setpgid(0x0, 0x0) [ 2082.970508][T16459] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:35 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x1ee0000000000, 0x600) accept4$unix(r0, &(0x7f0000000480), &(0x7f0000000500)=0x6e, 0x80800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x42000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB="ac010000", @ANYRES16=r3, @ANYBLOB="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"], 0x1ac}, 0x1, 0x0, 0x0, 0x4000040}, 0x8041) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r4 = userfaultfd(0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="2600000002721cfc7a00000043720b9457602c78b19c907c1bca705ede91838b9746dcaeb0634faf4bc4216c96d18102e94d7d523bca6e103f6d6cd1a62b8ea0e1335d97df83d81255ffa0cba1f4cbe3a16b77e0045627607e629f27469542797c6a34ca9de010253665a3fa9fe65b651b46ae50d61f0b4419dab15917173ae6237004da417ed7cc509cad"]}) close(r5) close(r4) syz_open_dev$audion(&(0x7f0000000540)='/dev/audio#\x00', 0x100, 0x0) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) timerfd_create(0x0, 0x80800) 17:56:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xd5950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x180f000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000140)=0x8) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x4, 0x400) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000180)={r2, 0xda65, 0xc6, "f712549a48379ce1d29b638041dcd77e9d38fe4bb0be0e1dd999e2b9d9b4650c7b48f5d05cdfca321ea70ad25a9ae9c4e4b166deead7e54729828d3d5ff9e7eb602bc34cbc631da52599acaf9446ad4c9d507c4277d6532578e1205676a2c90e9d175b22d213b3c19fd47570319ebcce4bcc33c2189b8fa9c96ee9e92117b2578878f86ce7cbfc5b99689ad4ef44d3dd3aeff79afd8f31b66412e381158d479528fce1a1768905ac141947638da9353182691d5aea4627669cf8b02a4b77cf14ecee87f89faf"}, 0xce) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x41, 0x2}}) close(r2) close(r1) 17:56:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x500) [ 2083.460422][T16494] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f0000000080)={0x1, 0x3f}) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r3) close(r1) 17:56:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f00000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000008c9d5cf69942f4ac1ea159e03d85315a9d00000000ad12cb2b4a07cf817a716f5d51e0e733f99d28c6f1aaea1abbf63465131783dec56d0ecce7e70dd990c6edde90d40909479d406228817d2bdadacbbc640538903648dfaa6f033ddb7a0e006b255ebedae9820469f4e41afd18ae06c0ba13c76e30b271325cb79ce021b9ca223d0056bb1a6c77ce3adc1770652897832213a9b0be5f66fa467c10db4d7c50fdb3d65c44a43a2affd9e6242c55742db6eea262b9bcaa9dfb4f50b60a4c02af6e5233b401792179832f6377ede11500311bfef026c47b633a75117218b7fc32a7895a0000000000000000000000000000"], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x20000, 0x0) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000280)=0x1, 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x10000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) 17:56:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x42, 0x2}}) close(r2) close(r1) 17:56:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xd6950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r3, 0x81785501, &(0x7f0000000140)=""/171) r4 = creat(&(0x7f0000000000)='./file0\x00', 0xc8) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r4, 0xc0305616, &(0x7f0000000080)={0x0, {0x8, 0x10001}}) close(r1) 17:56:36 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2083.966346][T16538] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x43, 0x2}}) close(r2) close(r1) [ 2084.193652][T16555] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x700) 17:56:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:36 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x80, 0x137600) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000140)={{0x2, @name="cf23b3b7a99ab500e729ff92fa83a8e1f4b66c77af3a4aa43694832d906c7056"}, 0x8, 0x2, 0x2}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) socket$inet6(0xa, 0x6, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x100000000000003b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) delete_module(&(0x7f0000000180)='\x00', 0x200) timer_create(0x7, &(0x7f00000001c0)={0x0, 0x4, 0x2}, &(0x7f0000000200)=0x0) timer_settime(r3, 0x1, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f0000000280)) 17:56:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x10000, 0x101000) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000080)={0x1, 0x1, [0x100000001, 0xffffffff, 0x2, 0x8, 0xc4, 0x3f, 0x101]}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:36 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xd7950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x44, 0x2}}) close(r2) close(r1) 17:56:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00'], 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) remap_file_pages(&(0x7f0000012000/0x4000)=nil, 0x4000, 0x4, 0xab, 0x3) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x900) 17:56:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xd8950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x45, 0x2}}) close(r2) close(r1) 17:56:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3f) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2085.094989][T16619] validate_nla: 1 callbacks suppressed [ 2085.094999][T16619] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/166, 0xa6) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r3 = getpgrp(0xffffffffffffffff) prlimit64(r3, 0xe, &(0x7f0000000000)={0x7, 0xffff}, &(0x7f0000000080)) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='&\x00\x00\x00']}) close(r2) close(r1) 17:56:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x46, 0x2}}) close(r2) close(r1) 17:56:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x5004802, 0x7) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r1, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xd9950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xa00) 17:56:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:38 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r0, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) [ 2085.651001][T16659] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:38 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x220000, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000140)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x803, 0x1) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r2, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x47, 0x2}}) close(r2) close(r1) 17:56:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xda950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) r3 = accept4(r0, &(0x7f0000000080)=@ipx, &(0x7f0000000000)=0x80, 0x80000) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='team_slave_1\x00'}) ioctl$SIOCGETNODEID(r3, 0x89e1, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) pwritev(r2, &(0x7f0000001280)=[{&(0x7f0000000200)="740c2f8bf8d66ba001220ae6f26a372091a0becc7de30dcc00d79903cbc85a6dea174e90fa2382cf583cc93c85cdc250947e745e7e85344a444d120aee33e918feaf1d9fd472db4c9584e7a73d051d0b889c2c305c53ff115bd91e7e528b8c06e84bddd45cf63a710dff1d205b912fb1d77ceedb46ba67245621af6b45912978c4c9a943cf4a1d5ab0e6bb1821acce40a119f6199fa46691bb8fea2edf58f96d6163e680e60bcdb0c6e8e2ddce0e56d8cc14ba44ba42f5d83fc46a32ba7641f775c40ea107fdbfc9b568d057778645a51d908d3a697163d67087821c18e787b69ed47ea649cd6ca2e77719ac3aef717c2478b663e8a82da87ec36fe7ac41a604b2f8d9a3652610a625ad35254723a85333fd641ce2ca2501851bb8c36064a049b5b41c83b179ec58ca5218bb3bbcc3315c8562ed642e6d8930bb53e16d11ebc4ca95a79b468e82a68351cb480024e70904179c5fb3154785a5dfe7d5c393265eebc39584a7e37728fbfb55378dfb5337bea7c4fe6dded124fe7f16dba33eb9dc7f106cd22e5da21e56dc38d0fe5fef0df46fd2377db068c23d01fc5fb6cb9543263c33d19c46ca761359d15084809d4aab4f64789f10697bf8c7382ff3a63479af90218e896e933d452b322f0b968dd21fd7742e62042137dc3edca10e33c9c73bf0e0d249a200004c15465c53bec3a4ae5302af5f34489a6280ce245b3cb9e88ab4c3ccf088bbc79c00bbf1d07323f98582e2232a0756e00c47d998a35b0ed613350d622f99ab93c2923866850ac855bf453dab294e195e3b0de7ca1677af7867260afefa6e92f237d0c7291d215b5166c004ad2db3ab1265307946f92c1b5b1534a294351eb548a7b0c6da3ffbb3b8ffaa8f1367b4b077ff94fe20ffe8693d4e0d38bf21efae2a61c8bb9ba9658e4d5af36fea5762a7e66c69e62604e777edbd120ea7a958fdfe4624a93a64d4d71edf526c90259c57255032d723db118786958924c06fda81777b16e894c023580bf59d6c6849f192e95ef59777c1350f529bc91b4379805ed21d9856fd4edc736be1310a7f77b034bc90364326b54c2b250795d4e9ba2ce50f83445d9d33b11585fc44f97e0ee560fa8c07327667126b99bd9424e921e9d10c49dd9e511fe8012c66a06f77d4936f1b1b45ae514e0dc166293eeb877896f100d555b921ba87f4d3f11d89f3a6271610b6a6b7736bc3260d4940646ad33d59d0c09b55c16aa2804e597951855e5b1f3b645f73263edf44696d1c2e408c540c7ac917503addc31ac6c3b1fa9ded8e78dee6b5a929ad942959e2018eb679d9092b3738b1e74bebf17c045971c1bcf0dea3de2ef96dcd8b32c3e175d613739dc45221a569641f2f48462e5a87919f41fe80f691f28cd27affd71c62709ac5eb0fe9c697c595d6b04203c16e0098f4e1429bd41af70dc9e4209aa71403a7c5422747156187c8a75397d7746b0d73f924a8ded7bb735044672bc4151dd382eda223a626bf363d0df5e48b7032c387ed4220ad4a257fac84e9b03c1d4773b919d593bc3162a2010f11b16fba2cee4bbcc1305481a479145e73707f87b5ea7a7b62efb310729888e78fbcab902c648e722a1e66179933f91d7978938367dc801f0aefe2cd9cc6f931063504aeabc7578fa5b24887b1e266b18c3c81eccdaff40b8080b0aeaddec64a08e6901ae7afbb6925ec6f5bb17eab14664706b1a7eda7df72398553a40839688044326d70883ec82314c3e71fc6684c886d97536619a9804d6c6048b12c9bf261c759cb8b4dc7fd6dd27c52acbdca7d4e9d0015d015aaf1f2e089c07d545ce1a002ffec14a528431d687779ec8462d92fd92d61982c7d4d7a9b23f5bf4f34739c72216282861d737f8b829bbd37f8721c4880548b753c074c153e45a123ce89f854916e27c6eb6a4d9123f37488574e3b36b8058e15a877a2d0b399de41adc673f86dc48034f960dc5d7cbb42e8ff9a53287a40b415857843366744b6ea52e21ea6df34f3deb0148f250a277bee1406f26d5e439a3240ed81a6879d41d29ceea65f2d9f75c0551c2290365766204a8a711530d17e5183f9c3f5ad0ab172e94d94b5a180022d4c02ffad9de5c7ca4619ade9b24e9bb11492d59ddedb3859a32b674e30494e030737f92b5215f2dad9301cbaaa5b5941c7a107980ab4049409b66ecba2598792d19bcf95beb8b9ea22e81463e375c32818c50770891de250a49222750788e829cbbe4cfb92b4e74c22af73748e83d21d4b088369521961530ea8b52009ee55246a1e4ae8e9593daeecb2a992fba672cf8c2d9194a6857a3d30abe512ab2413020ecd2080a86f0c2f8514f1370e8a9703219b8382833bf280f6f57fde98ac033b03c899f1818cc4636f3b925bc326a8acf886a74c566cca7dfd26b762288a31e5ee011ed5272b175530105f25e7e289f03cb80cd5a1a8efef07d9471da55c350dc4ad172a0d463daa9062c62838085d834d56f1e17b3aacc0fc4d4eb2985e15f341b9441d258fbe9f0b2f68e83afef9430e88b8a9dafff4b925e216acd4920a15aaec8e76f4bc33b0a86ffd757d4a472e7243d555e963c0f353a22d46d154fd01f03cdacb58a8e44b9d2cffbac96ea192aa182aad4344e1823e8377cd3f1ad0991bb8db00bcfed72bd05d46b636da0400165cfed4a867ad9a908db4a97e0f4b9a12aa95090e920add175f8413734351904f8969437567be41a32287139a9111b476a127051d4172eaf3123dff33242240434fded83622af92ec678f23caebed93174617cb3fcbf521cb385d7067b6a0da5d90d2d26e056dc41ca409cce96717825018158891e391ef8a5a01c15d5a72bb8507e37e6ec331908cae09a55c2ce70e97dc7cfc09f728c0c7efbaacf5329055e1c35fccbb66625a8eb18f9587b0bf4f5f3018ee0141203e4396f7467e53e48e0f6de23b80a52f1cfd3c249ef57f77943071f1723bb12d060c008ce0946d061293c6d9b9a790028877057a30041771a9c9a3447dc2361ebbb25a3e2229995b973b2251e5b4c092e0e13f28e90fbd6cd59ce6f2bd8c6251cf83a4f1971f413763601a1b1f26f0e3ae6f39d48c9b5c6d1d4f9c84fbf85db3e0f1169615966cae5cbdfa0a791e7e958092a93247ee88488c5e8e37c73174d19c4496f98bc93cba7ac1a8dabd50ba0825ccb04b08957bb8aea77d117a417b35f3d80edc1857816b381dd39a99c3836487e509399a6e619575831ff9650b3326a1cb1f0acccc05d8df943f28d269d37426e77e51e23727177f57009987f8d2bc936bedd7767811a0fc076c06b997f13027178ab39da3b460a83b2697ef82be50bf7fc3655da75203c4ea22536cade7722a545ab2243eaa6148ccd8e4ff49652f0db7dfedb52ffd5a8031814d1f7cb7ef449ec90713b433af0584c99845a1e8703b50dfb4a53357ecdf19713cdc204c55a572b0eac2ec1d43289f3ae573c80a3b81da6ef49dfa3dee17367a49c83fdadff26468e4d5306605c91598fac678f6aa65ddd85f6921f2895fe95d62df2fdf0f6129f840789a15d7cd2557b1e9505a981f8451c4bf4ce60b083810c187e200bdd8155f2176a96836e2d945d8b8da366d589a22096cbf91a1d9c562f73087bac513085b43d4b8ba98f025ab0b689e5ef53f5f44efb999d80175102ad2088c6697d83774b9c1de8f94f0141cf4979d29e1bb82194c11f8156fe6af1fa506b2b34edd6d8869c2898e609ba1671e5d63d5a839190e07a857ce00420b2ca59f65abbfbdbf47747565ee4cbab14a704e609df532db9510856798c1be73660419ead0056e78747ea925abeb1d500be4778d4e5361a5ff917f30f22fd7ef79f48c03ca92b286559ff8b46ce7b8bb7bf70cfe5e96924ca38a0d6f8bfe41eb667eaf870bd68ca506c16f268ec82545dc1aef4281af92051a9060bad27838e74076d8d93408085959de5f1bba045aa4bd0cbae496e0aeefac75b7e257c4f4dce4bef7376fb6ff01cd69f7f5081e0067fd2a29a4585709aa02e60c117335599800695b23a784c2f0aa4d84345287a9f222a51483c25a70e7138c104349c7b2c3afb5b81b02b0c6c4bcb4bb728e8bf306a884b039d9551afc785535c7626df4daca398731d8fb90b76af13fcf6e4e5742a4b39e72223e2bab97bded8706eb5326b704083f91c50dbd8f33b339c740fde50a5586d73b8f8431ddd225fc2870d63fa477915fff78a7bb5823cf29913afbb0d3793df133d84a92740acef50fec183a089a74c3eea2345c53b63e411e91820a84ac1f97f846266c59acf5c6126de19681b83a3c97262243f0dd7d7dfdfb1873ccb33ee315b6e3764ef7d99d0ad13ad5ee864b95c4884516d381a51ee821da8dd7aa37eee2d594d861368bea7f67085dcadd5908b3b98002eb7b8022e9405ab14ae9bab6bcc70814b469996b405bbfbab4a98814419a6fd009893678792ba1f79c6890ee885a4ae8ce28734c14675155fdd80c6bfeed5e753f4d0ef0605293a0e533d8e627175bd4a7248b17d0e45e8215ac40040afb769f64589c7c1bf6ff6f1b4fa131204c472709a02cc9a9aef01d8a11083a2618fd0d9b9f5bb45dc3123d5e02db66073891b6c3007b9e29d346275572dee8b1f1979206ea70bd42c99d63aa56fb11b9207eca6cd91dd703dc04e80e9d97f09c66be9bea03d1a0b12fbeec7af945888ff8cb21d46f0d70acd4ea926759b70976c83d381547ac4584c28cb5ccfa85a92b57d4e8a1e0f0311d290d400b873242c46e7b9a9ad05c1ab2a4ace477b91fdab846bf9b934b35539a21279a2723c3efbfc42062f21485546f9b007dc66f8e1ef5f08a1c45c16b8e3c6e0885b6949fffa4885b1752c61e7b6b14cf4e7f267d64c20897615b4c5e8125baeb930941577f6ae90705222c59de9e7ad680282930025e7ae2892c749be644cdbaaf25d36aa3e2e71104dbc413ba559cb499a13b4ae18f40157563d066be22529edc77e633b36297f0fca802cfe9ec8116eadbf3e50127dc9c2f4ff37176a895f05567b3968dd6c7dd0dfe2013e51700c10f3e9574d28021989b6d1000fa11876f63640b58450037b42345a3999eaba884bd0ba44aebe1c15ab243e43dbb329dfd954f41be734c60b3289fdf210ec29f3391ed2a1e2a88ebdbd4468f966f88943a2e9cb1f5b600da89af7810c8334eb394f44e6607d8a5a23b6f59cbb19025aa70ee03110453a73b065d9debdf53af16fbe030ed8282d53860bd4ddeb09de273729a2bd82f311e430a83dcdc6e48c17f6b367dc4f7134673febc6fbc9799395d348b2ab03e719cce4aeb1262ec1512e5c55717b5c1f3fe2dd0df2d4e112821a6f1b272aea649ceedb555c272c1c610b5f284104fcc5acbbd6c98213419a0cd4b042c961bf8effc9d7c0087ec708d6da8050ba509e4b6da1eeee7ae2ae9bc94081d4c2146cf9aeb7d2f333ac9c55dbe23c5cd6540725f7e92ee7723c042c372f1d0da30ea8cfcdc7953619cb4a17f84cf00a7eb4b527793ca2b1f02bdb625ebc788422e841bbb904787c5d81730489e4681b527e23a85afcbfb5e1e868075083946fb4d056f7da0e3db51b605113552b25f3ce888bb30aa7b24a83e8e1dfd7dbd570667622f47f050d3fb8daaf863428f57e9534ab3e777ddde9ece12300969e91a925a40b3b6d767d5f1d0f410073439dbfafab9ce336127ea90ac7ef129841b6b7bebb7b5667b594523a64bca7c3cf1f471d8f0136851664f11a121f3e680fc49fcc567cf3744d3c38ec47a12b71aa4cc2c56c71d5669de26a87523d3b4", 0x1000}, {&(0x7f0000001200)="2ade0fadc69eeb22caabc2e43f5848a1bf876b275fda00f39304a187e7af5dff3cb399f4d5f76e8e9779f3aa2f4489dbabcd16ebb4d879a8a3550e2b49147425685b81d8293e71d8294015a3ce25add7c6d8a3569bdc29", 0x57}], 0x2, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r4) close(r2) 17:56:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xe00) 17:56:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:38 executing program 3: 17:56:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x48, 0x2}}) close(r2) close(r1) [ 2086.264250][T16711] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:38 executing program 3: 17:56:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='vlan0\x00') r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r3) close(r2) 17:56:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xdb950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x49, 0x2}}) close(r2) close(r1) 17:56:39 executing program 3: 17:56:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000080)=0xa101) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000180)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000012000/0x3000)=nil, 0x3000}, 0x3}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="260000000200dd68"]}) close(r3) close(r2) 17:56:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xf00) [ 2086.817936][T16747] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:39 executing program 3: 17:56:39 executing program 3: [ 2087.162306][T16776] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4a, 0x2}}) close(r2) close(r1) 17:56:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x1, 0x101}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000140)={r4, 0x200}, 0x8) 17:56:39 executing program 3: 17:56:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xdc950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000840)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x628, 0x3f8, 0x2e8, 0x2e8, 0x0, 0x0, 0x558, 0x558, 0x558, 0x558, 0x558, 0x5, &(0x7f0000000080), {[{{@ipv6={@mcast2, @loopback, [0xff0000ff, 0xffffff00, 0xffffff00, 0xffffffff], [0xffffff00, 0x0, 0xffffffff], 'teql0\x00', 'tunl0\x00', {0xff}, {}, 0x11, 0x0, 0x3}, 0x0, 0x180, 0x1b0, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x4, 0x1, 0x9, 0x1}}, @common=@srh1={0x90, 'srh\x00', 0x1, {0x3a, 0x8, 0xffffffffffffff7f, 0x101, 0x4, @local, @remote, @mcast2, [0xff000000, 0xff0000ff, 0xffffff00], [0x0, 0xffffffff, 0xff, 0xffffffff], [0xffffffff, 0xffffffff, 0x0, 0xffffff00], 0x2008, 0x8}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0xee0, 0x5, 0x100}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x5}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x6, @ipv4=@loopback, @ipv6=@ipv4={[], [], @multicast2}, @gre_key=0xffffffffffff8001, @icmp_id=0x67}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x15, @ipv6=@rand_addr="2ad772cca3c34bacfc34abbe26e8d952", @ipv6=@local, @port=0x4e20, @gre_key=0x800000}}}, {{@ipv6={@loopback, @empty, [0xffffffff, 0xffffffff, 0xff000000], [0x0, 0xffffffff, 0x0, 0xffffffff], 'eql\x00', 'rose0\x00', {0xff}, {0xff}, 0x21, 0x80000001, 0x2, 0x40}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @common=@eui64={0x28, 'eui64\x00'}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x9, @ipv6=@mcast2, @ipv4=@multicast1, @gre_key=0x3ff, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x688) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000000)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26}}) close(r3) close(r1) 17:56:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x1100) 17:56:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2087.514032][T16799] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000840)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x628, 0x3f8, 0x2e8, 0x2e8, 0x0, 0x0, 0x558, 0x558, 0x558, 0x558, 0x558, 0x5, &(0x7f0000000080), {[{{@ipv6={@mcast2, @loopback, [0xff0000ff, 0xffffff00, 0xffffff00, 0xffffffff], [0xffffff00, 0x0, 0xffffffff], 'teql0\x00', 'tunl0\x00', {0xff}, {}, 0x11, 0x0, 0x3}, 0x0, 0x180, 0x1b0, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x4, 0x1, 0x9, 0x1}}, @common=@srh1={0x90, 'srh\x00', 0x1, {0x3a, 0x8, 0xffffffffffffff7f, 0x101, 0x4, @local, @remote, @mcast2, [0xff000000, 0xff0000ff, 0xffffff00], [0x0, 0xffffffff, 0xff, 0xffffffff], [0xffffffff, 0xffffffff, 0x0, 0xffffff00], 0x2008, 0x8}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0xee0, 0x5, 0x100}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x5}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x6, @ipv4=@loopback, @ipv6=@ipv4={[], [], @multicast2}, @gre_key=0xffffffffffff8001, @icmp_id=0x67}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x15, @ipv6=@rand_addr="2ad772cca3c34bacfc34abbe26e8d952", @ipv6=@local, @port=0x4e20, @gre_key=0x800000}}}, {{@ipv6={@loopback, @empty, [0xffffffff, 0xffffffff, 0xff000000], [0x0, 0xffffffff, 0x0, 0xffffffff], 'eql\x00', 'rose0\x00', {0xff}, {0xff}, 0x21, 0x80000001, 0x2, 0x40}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @common=@eui64={0x28, 'eui64\x00'}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x9, @ipv6=@mcast2, @ipv4=@multicast1, @gre_key=0x3ff, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x688) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000000)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26}}) close(r3) close(r1) 17:56:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xa0080, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r3, 0xc004aea7, &(0x7f0000000080)=0x4) ioctl$PPPIOCDISCONN(r3, 0x7439) close(r2) close(r1) 17:56:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4b, 0x2}}) close(r2) close(r1) 17:56:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xdd950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2088.004928][T16834] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000840)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x628, 0x3f8, 0x2e8, 0x2e8, 0x0, 0x0, 0x558, 0x558, 0x558, 0x558, 0x558, 0x5, &(0x7f0000000080), {[{{@ipv6={@mcast2, @loopback, [0xff0000ff, 0xffffff00, 0xffffff00, 0xffffffff], [0xffffff00, 0x0, 0xffffffff], 'teql0\x00', 'tunl0\x00', {0xff}, {}, 0x11, 0x0, 0x3}, 0x0, 0x180, 0x1b0, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x4, 0x1, 0x9, 0x1}}, @common=@srh1={0x90, 'srh\x00', 0x1, {0x3a, 0x8, 0xffffffffffffff7f, 0x101, 0x4, @local, @remote, @mcast2, [0xff000000, 0xff0000ff, 0xffffff00], [0x0, 0xffffffff, 0xff, 0xffffffff], [0xffffffff, 0xffffffff, 0x0, 0xffffff00], 0x2008, 0x8}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0xee0, 0x5, 0x100}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x5}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x6, @ipv4=@loopback, @ipv6=@ipv4={[], [], @multicast2}, @gre_key=0xffffffffffff8001, @icmp_id=0x67}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x15, @ipv6=@rand_addr="2ad772cca3c34bacfc34abbe26e8d952", @ipv6=@local, @port=0x4e20, @gre_key=0x800000}}}, {{@ipv6={@loopback, @empty, [0xffffffff, 0xffffffff, 0xff000000], [0x0, 0xffffffff, 0x0, 0xffffffff], 'eql\x00', 'rose0\x00', {0xff}, {0xff}, 0x21, 0x80000001, 0x2, 0x40}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @common=@eui64={0x28, 'eui64\x00'}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x9, @ipv6=@mcast2, @ipv4=@multicast1, @gre_key=0x3ff, @gre_key}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x688) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000000)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26}}) close(r3) close(r1) [ 2088.152420][T16834] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4c, 0x2}}) close(r2) close(r1) 17:56:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="e7ed006b263827f7dabcd3049096"]}) close(r2) socketpair(0xb, 0x80007, 0x3f, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$llc(r3, &(0x7f00000000c0)={0x1a, 0x324, 0x5, 0x4, 0x401, 0x1, @random="9f807e8c0673"}, 0x10) bind$llc(r4, &(0x7f0000000080)={0x1a, 0x33a, 0x7, 0xfca, 0x8, 0x5, @dev={[], 0x15}}, 0x10) close(r4) 17:56:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x1f00) 17:56:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xde950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) r3 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@remote, @in=@multicast1}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) getgid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20, 0x1, @empty, 0x3}, 0x1c) listen(r4, 0x20000003) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0xc, 0x0) write$P9_RRENAME(r5, &(0x7f0000000100)={0x7}, 0x7) sendmmsg(0xffffffffffffffff, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)}], 0x1, &(0x7f0000000580)}, 0x6}], 0x1, 0x8000) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="e7ffffffffffffff"], 0x8) connect(r6, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r6, 0x800448d2, &(0x7f0000000280)={0x2, &(0x7f0000000140)=[{}, {}]}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000001180)) dup3(r6, r5, 0x0) fstat(r0, &(0x7f0000000280)) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) fstat(r3, &(0x7f00000003c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@dev, @in=@initdev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000005c0)=0xe8) fstat(r2, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) getgroups(0x3, &(0x7f00000007c0)=[0xee01, 0xee00, 0x0]) geteuid() 17:56:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4d, 0x2}}) close(r2) close(r1) 17:56:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf4ffffff00000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2088.563793][T16878] netlink: 'syz-executor0': attribute type 22 has an invalid length. [ 2088.771589][T16880] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) r3 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@remote, @in=@multicast1}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) getgid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f000047b000)={0xa, 0x4e20, 0x1, @empty, 0x3}, 0x1c) listen(r4, 0x20000003) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0xc, 0x0) write$P9_RRENAME(r5, &(0x7f0000000100)={0x7}, 0x7) sendmmsg(0xffffffffffffffff, &(0x7f0000001080)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)}], 0x1, &(0x7f0000000580)}, 0x6}], 0x1, 0x8000) setsockopt$inet6_opts(r6, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="e7ffffffffffffff"], 0x8) connect(r6, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r6, 0x800448d2, &(0x7f0000000280)={0x2, &(0x7f0000000140)=[{}, {}]}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000001180)) dup3(r6, r5, 0x0) fstat(r0, &(0x7f0000000280)) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) fstat(r3, &(0x7f00000003c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@dev, @in=@initdev}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000005c0)=0xe8) fstat(r2, &(0x7f0000000600)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000680)={{{@in, @in6}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) getgroups(0x3, &(0x7f00000007c0)=[0xee01, 0xee00, 0x0]) geteuid() 17:56:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xdf950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4e, 0x2}}) close(r2) close(r1) 17:56:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2000) 17:56:41 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x9c0c0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r3) close(r2) 17:56:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xe0950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4f, 0x2}}) close(r2) close(r1) 17:56:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2300) 17:56:41 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) read(r2, &(0x7f0000000140)=""/43, 0x2b) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) dup2(r0, r2) tkill(r1, 0x1000000000015) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_opts(r4, 0x29, 0x3b, &(0x7f00002a7fc8)=@routing, 0x8) getsockopt$inet6_buf(r4, 0x29, 0x3b, &(0x7f0000000040)=""/164, &(0x7f0000000100)=0xa4) 17:56:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff00000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="2700000002000000"]}) close(r2) close(r1) 17:56:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xe1950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x50, 0x2}}) close(r2) close(r1) 17:56:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:42 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000014000/0x4000)=nil, 0x4000, 0x4, 0x2010, r1, 0x2) r3 = userfaultfd(0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r4) close(r3) 17:56:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000000, 0x1) write$P9_RSETATTR(r1, &(0x7f0000000080)={0x7, 0x1b, 0x2}, 0x7) r2 = userfaultfd(0x80002) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="273d286f000100005b29dbaf569ac25eb81db4d1549980f4118b2731c160b762cebf1496569924b4792600acddb7e98951eaf6018c62c8577bb1a8f93934296cb0b09a9ce2e877ed1fcccd6553aef1e2ac9115eeaccf552abc2137036697c1048a9dcb3dfca004da5f20a65a1ccc92c8849027d683fa06dc25b2426246c8900742ae12d5c6ab5f64f270617b23893e263e2960fb4d3e519f729e412491b208508e48141640b724ffddcafa4569b910c0343e4f747b8c70af19"]}) close(r3) close(r2) 17:56:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2500) 17:56:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x51, 0x2}}) close(r2) close(r1) 17:56:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xe2950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0xfffffffffffffffd, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xa0040, 0x0) ioctl$KDGKBMETA(r3, 0x4b62, &(0x7f0000000080)) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:42 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000014000/0x4000)=nil, 0x4000, 0x4, 0x2010, r1, 0x2) r3 = userfaultfd(0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r4) close(r3) [ 2090.473410][T17017] validate_nla: 3 callbacks suppressed [ 2090.476865][T17017] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2600) 17:56:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x5d, 0x0) 17:56:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xcd, 0x2200) ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0x36) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="2603286ff339255e"]}) close(r2) close(r1) 17:56:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x20000068, 0x2}}) close(r2) close(r1) 17:56:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xe3950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) fcntl$addseals(r0, 0x409, 0x7) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r3) close(r2) [ 2091.031799][T17060] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:43 executing program 3 (fault-call:8 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xe4950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x3}}) close(r2) close(r1) 17:56:43 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa, 0xfffffffffffffffc}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="cbbec2cd5dfe06ae22164d925353b2d3d945ede1af83b0998a87ae514478eefd680d805169086a05db4c4819b2acdeb9065bd034d6db54f3f95c3629304f90f1452089f24b8f9a9cd310710426b6ecb9c7d66ef22de536ec344740357ee1a54517b4d7abbeaef627f0d2595ae698dccd99c424ac805d7b7151b7dc5df2b1"]}) close(r2) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000000)={0x2, 0x0, 0x7, {0xfffffffffffffff8, 0x5, 0xffffffff, 0xe20}}) close(r1) r3 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x2, 0x5, 0x80000001, 0xfffffffffffffff9, 0x4}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0xffffffffffffffc1}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000300)={r4, 0x3f, 0x7, 0x2, 0xfffffffffffffff7, 0x8, 0x1, 0x8, {r5, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x7ff, 0xe47, 0x10000, 0x8000}}, &(0x7f00000003c0)=0xb0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000140)={0x6, 0x4, 0x602, 0x0, 0x2c, 0x139, 0x9, 0x2, 0x5, 0x7, 0x824, 0x5, 0x0, 0xfffffffffffffffa, 0x5, 0xfffffffffffffff8, 0x6, 0x6, 0x7fffffff}) 17:56:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2091.468135][T17085] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2700) 17:56:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80001) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xe4ffffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x2, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:44 executing program 5: uname(&(0x7f0000000140)=""/211) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="a6c04517"]}) close(r2) close(r1) [ 2091.989967][T17132] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x541b, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2900) 17:56:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xe5950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x195000, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x3) [ 2092.463311][T17171] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x5421, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xe6950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080)=0xfffffffffffffffd, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2a00) 17:56:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x5450, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2092.881236][T17204] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000140)=""/4096, &(0x7f0000000000)=0x1000) close(r2) close(r1) 17:56:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xe7950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x5451, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2093.298979][T17237] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:45 executing program 5: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socketpair$unix(0x1, 0x6, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000010000/0x3000)=nil, 0x3000, 0x4, 0x4a012, r0, 0x8000000) r2 = userfaultfd(0x80000) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="01005e0200000000"]}) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x410383, 0x1c4) ioctl$EVIOCSABS3F(r4, 0x401845ff, &(0x7f0000000140)={0x0, 0x400, 0x10001, 0x6, 0x7, 0x2e93}) close(r3) close(r0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000080)=""/124) 17:56:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2b00) 17:56:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x5452, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x280000000005, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xe8950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2093.809888][T17278] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2093.978768][T17284] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x5460, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) r3 = dup3(r1, r1, 0x80000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f0000000000)=0x4, 0x8) close(r2) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000140)=0x78) close(r1) 17:56:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xe9950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8901, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x4904) 17:56:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']}) close(r2) close(r1) 17:56:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) [ 2094.419448][T17325] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x25, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8902, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xea950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x100, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0x100000627) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x1, &(0x7f0000000540)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x100}}, {@max_read={'max_read', 0x3d, 0xfffffffffffffffe}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x1000}}]}}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffff9c, 0x84, 0x8, &(0x7f0000000000)=0x952d, 0x3) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000500)) close(r5) close(r1) 17:56:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8903, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00', 0x0}) connect$packet(r3, &(0x7f0000000680)={0x11, 0x1b, r4, 0x1, 0x8000, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x14) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x8) close(r1) 17:56:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x6000) 17:56:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) syz_init_net_socket$ax25(0x3, 0x7, 0xcf) close(r1) 17:56:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8904, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xeb950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r1) close(r0) 17:56:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x397, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8906, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9f00, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80100, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r2, r3, 0x7}, 0x10) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r4) close(r1) 17:56:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x9, 0x0, [], [{0x7, 0xfffffffffffffffc, 0x7, 0x7, 0xffffffffffffffff, 0x5}, {0x6, 0x9, 0x8, 0x5, 0xfff, 0xffffffff}], [[], [], [], [], [], [], [], [], []]}) close(r2) close(r1) 17:56:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xa503) 17:56:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xec950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8907, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2095.932878][T17448] validate_nla: 2 callbacks suppressed [ 2095.932888][T17448] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r1) close(0xffffffffffffffff) 17:56:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x890b, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa000, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:48 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xa000, 0x0) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000080)=0x3, 0x2) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="85028e9dfeb0de1d"]}) close(r3) close(r1) 17:56:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xed950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x890c, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2096.365485][T17476] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x1ff, 0x202040) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4000000000000009) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) connect$l2tp(r3, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x2, {0xa, 0x4e24, 0x0, @local, 0x2}}}, 0x3a) close(r2) close(r1) 17:56:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xc3ff) 17:56:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7f, 0x400000) ioctl$CAPI_GET_MANUFACTURER(r2, 0xc0044306, &(0x7f0000000140)=0x7ff) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) close(r3) close(r1) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r4, 0x4040ae75, &(0x7f0000000080)={0x80, 0x7fff, 0x39, 0x700}) 17:56:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8910, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x200, 0x80000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x80000000400204) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000080)={0x1, "c6b4916c38494e34960eeb4c11a0ab051a681fd303daa9669538f33fa26d9edf", 0x1, 0x8001, 0x0, 0x100000, 0x800, 0x2}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r2) 17:56:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xee950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4202, 0x0) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000080)) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'yam0\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26}}) close(r3) close(r1) [ 2097.033319][T17522] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8911, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000013000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xe803) 17:56:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xef950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) getsockname$ax25(r1, &(0x7f0000000080)={{0x3, @rose}, [@remote, @null, @remote, @default, @rose, @bcast, @default, @default]}, &(0x7f0000000000)=0x48) 17:56:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8912, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2097.527250][T17564] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x1000)=nil, 0x1000, 0x1000006, 0x32, r1, 0xfffffffffffffffe) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x400000) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000080)={0x10001, 0x7, 0xfffffffffffffffe, 0x1000, 0x870, 0x48}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) sysfs$3(0x3) fcntl$dupfd(r3, 0x0, r0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="26eac29b90000000d01bfa42cae69b895bfd9219a3483af14bcb5a53494f8e17f454c9e3965a6bac24e65d8d7098406eeeb0ded4035c24d2644a0f17d0fbbe5cbaf6"]}) close(r4) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000140)=0x4) close(r2) 17:56:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95)=0x40000, 0xffffffa5) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) read(r1, &(0x7f0000000080)=""/88, 0x58) close(r1) 17:56:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xf401) 17:56:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000080)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="536bbe919b000200"]}) close(r2) close(r1) 17:56:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff8880605791f8, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8913, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xf0950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) [ 2098.151072][T17611] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8914, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2098.348619][T17623] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xffc3) 17:56:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff888060579578, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xf0ffffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) [ 2098.601316][T17635] device veth1_to_bond entered promiscuous mode 17:56:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2099.395401][T17652] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:51 executing program 1: socketpair$unix(0x1, 0x400000000000007, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$packet_buf(r3, 0x107, 0x16, &(0x7f0000000140)=""/142, &(0x7f0000000080)=0x8e) close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f00000002c0), &(0x7f0000000300)=0x4) userfaultfd(0x80000) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f0000000240)=@ng={0x4, 0x2}, 0x2, 0x2) 17:56:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4362500000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8916, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xf1950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:51 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x40) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) sched_setaffinity(r4, 0x8, &(0x7f0000000580)=0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r3, &(0x7f00000003c0)="50b93fab376be6b3c9d7ce1002098bb60e777a7d5576bae8a74fbd4f512867c18b7720f377992fcef5", &(0x7f0000000400)=""/141}, 0x18) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r5 = accept(r0, &(0x7f0000000080)=@hci, &(0x7f0000000140)=0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e21, 0x1ff, @mcast1, 0x800}}, [0x8, 0xdc5b, 0x0, 0x1, 0x9, 0xffff, 0xffff, 0x7, 0x1, 0x8, 0x80000000, 0x9, 0x8, 0x3, 0x3]}, &(0x7f0000000280)=0x100) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f00000002c0)={r6, 0x40}, &(0x7f0000000300)=0x8) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0e12200002000004"]}) r7 = socket$nl_generic(0x10, 0x3, 0x10) close(r2) close(r1) ioctl$FS_IOC_SETVERSION(r7, 0x40087602, &(0x7f0000000340)=0x80000001) 17:56:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x34000) 17:56:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da436d003000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2099.798774][T17697] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000080)=""/127) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8918, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_TIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001580)='/dev/dsp\x00', 0x200, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r4, 0xc0305615, &(0x7f0000001e00)={0x0, {0x100000001, 0x38000000000}}) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000100)) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000001e80)) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000001f40)=0x0) r6 = getpgrp(r5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001440)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000001540)=0x21b) r8 = getgid() fcntl$getownex(r0, 0x10, &(0x7f00000015c0)={0x0, 0x0}) getresuid(&(0x7f0000001600), &(0x7f0000001680), &(0x7f00000016c0)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001700)={0x0, 0x0, 0x0}, &(0x7f0000001740)=0xc) r12 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001780)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001880)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000018c0)={0x0, 0x0, 0x0}, &(0x7f0000001900)=0xc) r15 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000001940)={{{@in6=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}}}, &(0x7f0000001a40)=0xe8) r17 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001ac0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000001a80)='veth1_to_bond:\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b00)={{{@in6=@ipv4={[], [], @initdev}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000001c00)=0xe8) getgroups(0x5, &(0x7f0000001c40)=[0x0, 0xffffffffffffffff, 0xee00, 0xee01, 0xffffffffffffffff]) sendmsg$unix(r2, &(0x7f0000001dc0)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000013c0)=[{&(0x7f0000000140)="a574506804b20dfe35adff2b636b39dec552d042e8b8f0e8de931599e2484720181098cfc6032690ef2f809db54e4efd6a5311a778da0f20387939cc16ac09100ec14cf0432f23dff50d360246c913025170a77400999ad4b9828978696cb905ad1ca325a327e5b8a7802e512210b368932db626c84ea09b2cc90a42b6c7b0a36025fd5c216fca2c909e12703f8e4d231d8abb4e3ce171", 0x97}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="82f01f3bfe04f12c19b645a55f3188137f0e2f87f8389ae05d4dcac2c1b690f4dce1842cdb264c6b067d16a8a1725a91ac9088db152d4e7e130c0180666753ac590b46b1c4d528c7d104d1f2ba0789ca04f0ad500c32bdc761a923642a52ea0eb824cf12aa203630162d2c3bd5cfcf966648626b69c7197f035b14e67693fff22742a48f2ac457fd413bad4e623a", 0x8e}, {&(0x7f00000012c0)="9d90504050dfaf6e3c197a3535a5d28efca1e8e043995db2aa8b44e96bd348c7f05309facd46631e0d79b9499fdfa23c32c71f7527255d65042f03891348fc007abba614f71273f711c04d30a385e3c3e2a3c6c588e93fc32645161f142cf215ed7758a2053cb171e8b92d473175cdbb6960a7442ab6451fb323727d2f4c8b445d56c350509ffda2d7585b97557da12814596d55cc483fe6324d01651adc9bb5a5074f42eb64d85e7a69825fbc81f9065a", 0xb1}, {&(0x7f0000001380)="0e26f69882264f5ca59c8885221b070c5cffe713864524f3421c", 0x1a}], 0x5, &(0x7f0000001c80)=[@cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @rights={0x20, 0x1, 0x1, [r0, r2, r3]}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r2, r0, r2, r2]}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x38, 0x1, 0x1, [r1, r2, r2, r3, r3, r2, r3, r3, r3]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}], 0x128, 0x40010}, 0x5) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000001e40)=ANY=[@ANYBLOB="2600008bfe5930bec5b499b1bdf70a580002000000b27a8834a40940f639d4fce48421af1ee7b408537205a50980b472004146754603721dad35a39a38"]}) close(r3) close(r2) 17:56:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da436ffffffffffffffff000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x40000) 17:56:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xf2950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = dup(r0) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000000280)='/dev/cachefiles\x00', 0x10) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) sendfile(r3, r3, &(0x7f0000000000), 0x100007fffffff) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x410000, 0x0) setsockopt$RDS_GET_MR(r5, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f0000000140)=""/236, 0xec}, &(0x7f00000000c0), 0x18}, 0x20) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="280057c600000200"]}) close(r4) close(r3) 17:56:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x891d, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2100.353717][T17738] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a02000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) get_thread_area(&(0x7f0000000000)={0x8, 0x20000800, 0x4000, 0x0, 0x7fffffff, 0x400, 0x7, 0x0, 0x2, 0xffff}) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="92cc000002000000"]}) close(r2) close(r1) 17:56:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x891e, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xf3950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x40000) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000080)=0xfffffffffffffff9, 0x4) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000440)=""/48, &(0x7f0000000480)=0x30) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x35, "a477866f0f888c90d6ae3fccfed2d0c1cb8f033c0c5711b9b625cfd2fc1f6f1e39285aef1211f0cd6858cad45fe69948f7cc2ed33b"}, &(0x7f0000000540)=0x3d) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000580)={r3, 0x8001}, &(0x7f00000005c0)=0x8) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="0001000002000000ae058952803f14a65b165b2e0c5e2c29708192d4d17dff496ad77f6d9a804a4614700633b709b1b34c0ff88edf29e78ccd87baa815cf1646a57b8f34072781d86297a05e112138672671f637fb3a993eeccea625b4a6d4536c3fab66e9d2d0d61e9abfceb1"]}) close(r4) close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x0, @mcast2, 0x83}}, [0x1, 0xdb, 0x7, 0x9, 0x0, 0x80000000, 0x0, 0x7fff, 0x0, 0x7, 0x4, 0xffffffff, 0x80, 0x81, 0x7]}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x9, 0x3, 0x1, 0x24, 0xcc78}, &(0x7f0000000300)=0x98) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000340)={r5, 0x9, 0x1, 0x7, 0x8, 0x4, 0x1, 0xfffffffffffffff7, {r6, @in6={{0xa, 0x4e23, 0x2, @rand_addr="cffe8b082774c6fa95d5a86ec1bd9cef", 0x6d}}, 0x0, 0x1, 0x3, 0x6, 0xe33}}, &(0x7f0000000400)=0xb0) 17:56:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a03000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2100.892919][T17785] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000012000/0x1000)=nil, 0x1000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x4, 0x10840) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000100)=0x3, 0x4) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x3, 0x5, 0xd, 0x14, 0x5, 0x1, 0x5, 0x83, 0x1}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="2600000002000000c333361ac9ef781d585c8842985608015973ebbcd18ce913c3e803d640e078f863eed63ad494fdac9d541de8e9194a538ab4a2ae2bd031d57aa78e932bcb34c922d907ffd2b570fbc598a25d2433eb87688a175602c786483603b2e4763226fc23c5052eb9c94ab55c575212709a41ded12e3b8e928aa958eb3fc397c54938948a2aaa4921fb265d3597860f3b5bef51b41fbbabcb2575bd5e221a7ab4ead80f1e444c7f931b3d709b6fb83f7238ee358be4ea154b0fb8d29f6c627419106334886c18aa061f31b92354453dae6b0ca147149449202f610633a2a25844b2210a1e2864de2f7cb39437a7"]}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r4, 0x4c01) syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x6, 0x0) socket$l2tp(0x18, 0x1, 0x1) close(r2) close(r1) 17:56:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x400300) 17:56:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="b2be2b1374603d7a14e8ec4c5e702fd5848719e4de2dbfda94f999482264697fbc43643b8f81045b4828c1f05b193911ad004890d7df62bed948125228a9fc732180d65d644c44e17fc08c5bcf26743647c46ab72b9905774459442619767ba3b487995b52fd86f48eec24b4747e22c22639a70233878b415079c79da0eea9970a0348f4a1efbda0e3147d53560ab807a0250b75bb78ecf4e47149d6bb8a167ce586bd9363fa66a69f4d433f42642f68b125ddf621dd0c51d3180c1301a1797dec952be1750fc4c2", 0xc8, 0x9}, {&(0x7f00000000c0)="1222b61a75781aa4a3e42f3f71a5538fe7abb9d188f6c24e81cf610b801b9d7731a35068c08c12c8", 0x28, 0x1}], 0xa00000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x200000, 0x0) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f00000002c0)=0x1, 0x4) 17:56:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x891f, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2101.153804][T17779] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r2, 0x100000000, 0x100, 0x9, 0x7e5f, 0x4}, &(0x7f0000000140)=0x14) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0400000000000000"]}) close(r4) close(r3) [ 2101.198853][T17802] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 17:56:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xf4950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8920, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2101.441220][T17820] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a04000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="2800000002000000c094f1f1a52e25a58389bf080086eb4b58628792537a781e1f83d8a3935858f5c495e0ef50b93047dbdc497f5cb9111d834f9806c58da6d507341c258ca298e1a4477a345609f33fb825cb7bd41f00ce23f39c40b76959b500ec184e24f611f694a438f16c0b06f9dcd0c40eb211f5f04e13b5fc41b1e84b7f0cfc0a21dec4601d"]}) close(r2) close(r1) 17:56:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x103240) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000080)=0x8, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f00000000c0)) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xf5950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xf0ff7f) 17:56:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8921, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a05000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']}) close(r2) close(r1) [ 2101.946795][T17858] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x1, 0x101000) write$P9_RVERSION(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="15ece9c90def5578c9000008003950323030302e75ef57077353630c44a6406561ed9dd3da6efed5f5faf5a7957d9eeef7ad73b01d2ff68e15cb57"], 0x15) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000000c0)={0x8}, 0x1) r2 = syz_open_dev$midi(&(0x7f0000002800)='/dev/midi#\x00', 0x2, 0x400000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000002840)={&(0x7f0000011000/0x3000)=nil, 0x3000}, &(0x7f0000002880)=0x10) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r4) close(r3) 17:56:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x1000000) 17:56:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r2) 17:56:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8922, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a06000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) getpeername(r2, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000000)=0x80) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f0000000140)=""/218, &(0x7f0000000240)=0xda) 17:56:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xf6950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) [ 2102.456153][T17905] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a07000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2102.592264][T17909] veth1_to_bond: mtu greater than device maximum [ 2102.623603][T17923] veth1_to_bond: mtu greater than device maximum 17:56:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="9f747b6e593e9362fde68fcd04500cc657bb018b2b67c6073e70930dab732670704f3b904ddd586af1c503153b46d867837371f1e7f4f595d17c197fa211ba32630c399905daee29ea40445a20852b903fe5bf7e19a1ef3a3dc93aacdd63bca61e060b0542f54e74ce528eecc35980b1c1738e57f8ab1e7f6a26eab94f82c3dbae630c670308babdf3817a95bc781c68be2b596116e38738526eeee03e9ebc11882e2bc1bbc4a1ddc1dd74"]}) close(r2) close(r1) 17:56:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000000), 0x1) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) socket$can_raw(0x1d, 0x3, 0x1) 17:56:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xf7950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8923, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a08000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2000000) [ 2102.942354][T17944] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0', [{0x20, 'veth1_to_bond:\x00'}, {0x20, 'veth1_to_bond:\x00'}, {0x20, 'vboxnet1security+{+\xbb]'}, {0x20, '-}nodev'}, {0x20, 'veth1_to_bond:\x00'}, {0x20, 'veth1_to_bond:\x00'}, {}, {0x20, '@'}, {0x20, 'selinux'}], 0xa, "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"}, 0x171) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x400000) ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a09000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8924, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x40a00, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000080)={0x50, 0x6, 0x0, {0x6, 0x6, 0x27, 0x0, '\xfcvboxnet1[posix_acl_accessem1.*security'}}, 0x50) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00\b\x00\x00\x00']}) close(r2) close(r1) 17:56:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:56:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xf8950100, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) [ 2103.485725][T17996] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8927, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a10000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="280098ac355669442ec54fb533704dd98454e90730e462c8db81cc9b705145bee4"]}) close(r3) close(r2) fcntl$setpipe(r0, 0x407, 0xffff) 17:56:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x3000000) 17:56:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xfeffffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) socketpair(0x11, 0x7, 0x401, &(0x7f0000000000)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x41008}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40004}, 0xc000) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="26f15b8703000000"]}) close(r4) close(r1) 17:56:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8929, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:56:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a23000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2103.977732][T18032] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bridge_slave_1\x00', &(0x7f0000000140)=@ethtool_ts_info={0x41, 0x7, 0x0, 0x6, [0x101, 0x4, 0xffffffffffffffff], 0x1, [0x5b, 0x6, 0x4]}}) close(r3) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0xbd, "a9bfdaf75a0b9dcaf9b062f1dbf32905736c479a55b4df4a9554e51fe4fbc08746221b73746150a61420aa060099b6e0a713e7bd3d4cc210ab24fdabefe6a697c8b3c1ad572ff306e9d66d250f29a3768fb000e515b1a2823a45bad66dea28d968c26dc6ce264d3bedb1287d3bbf725d025ee9353fcf07ff3932457c454deaf5c812b4878d851b45e7431f364e292c461e4b37c3a094bebfd175ed84f01595a0a0da02eed0279c8823dca0a0313b7a080ce18109ee64d02bd26ffc1a4f"}, &(0x7f0000000280)=0xc5) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000002c0)={r4, 0x119}, &(0x7f0000000300)=0x8) close(r1) r5 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x290000) ioctl$PPPIOCGL2TPSTATS(r5, 0x80487436, &(0x7f0000000080)="df5c2e5cb5774fd59dba15f1da0086c6cb75e02b38755945d0d97eac4dfbcb7b22673280e63ccf35ce656a71d0aae8f5b987a7d5d8e9973e123386bf5a5e8f3c3f65a5a67cf63f2d79baf3a2e6af0c4094db2e610cd65fe930b764348274272fdc2539e0690b5a84dee24f7c8d5edd11df28477a18834f01f598db5e96715851d2c643bc540c920ed7655a28bec87e66fcab2d2bbf2483a40b6404730b46") 17:56:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x4000000) 17:56:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8930, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xff7f0000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5d, 0xbcc1fd7725256506) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x12}}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x2, 0x4e23, @multicast2}, 0x281, 0x0, 0x0, 0x0, 0xc, &(0x7f0000000080)='ipddp0\x00', 0x4, 0xd3c, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="2880000002000000"]}) close(r3) close(r2) 17:56:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a48000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:56 executing program 5: socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) [ 2104.451816][T18068] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a4c000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8932, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000), 0x10) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r1) 17:56:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xffffa888, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="26e2ff0002000000"]}) close(r2) close(r1) [ 2104.846786][T18110] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a68000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x5000000) 17:56:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8933, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') ioctl$SIOCGSTAMPNS(r0, 0x8907, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r2) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000000)={0x6, 0x9, 0x28000000, 0x9, 0xff, 0x1, 0x3}, 0xc) 17:56:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xfffff000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:57 executing program 5 (fault-call:8 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2105.357095][T18150] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a6c000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8936, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000240)={0xaa, 0x1d}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0)=0x8, 0x4) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="28a61fde3ea6ef1cbb9c2d17496c4b1400000002000000"]}) close(r3) getsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000140)=0xfffffffffffffffc, &(0x7f0000000180)=0x4) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x7) close(r1) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f00000001c0)={0x89, @local, 0x4e24, 0x3, 'wlc\x00', 0x2, 0x4, 0xd}, 0x2c) 17:56:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xffffff7f, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:56:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x7000000) 17:56:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a74000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="8000000002000000"]}) close(r2) close(r1) 17:56:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8937, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xffffff9e, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x2, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:56:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a7a000000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2106.257500][T18221] validate_nla: 1 callbacks suppressed [ 2106.257522][T18221] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8940, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000280)=""/219, 0xdb}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0x102) accept4$netrom(r2, &(0x7f0000000080)={{0x3, @rose}, [@null, @null, @bcast, @null, @bcast, @remote, @netrom, @bcast]}, &(0x7f0000000140)=0x48, 0x80000) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000240)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000200)={0x9f0000, 0x0, 0x1, [], &(0x7f00000001c0)={0xbf0965, 0x79, [], @string=&(0x7f0000000180)=0x1000000000000000}}) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r1) close(r3) 17:56:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x8000000) 17:56:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x541b, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:56:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xffffffe4, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00030000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:58 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8941, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2106.696616][T18263] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x5421, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:56:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00050000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8942, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xfffffff0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) [ 2107.041260][T18290] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00060000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x9000000) 17:56:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000003c0)={@rand_addr="8e7e30e05058d846998a92ce24baafe3", 0x3a, r3}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x4041, 0x0) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8080}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r4, 0x706, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x20000040) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r5) close(r1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f0000000200)={0x0, @speck128, 0x0, "a2b9d738d39ad6ef"}) 17:56:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8943, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:56:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x5450, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:56:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xfffffffe, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:56:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00070000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:56:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8947, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2107.585641][T18335] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:56:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x5451, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00090000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup(r0) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xb8b, 0x1, 0x80000001, 0x100000001, 0x7, 0x9}, 0x1}, 0xa) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="ee0a806ab5ed7a330f14a745b83f2a021c6f2019e0105d655f75520e56d11666f16987cadce7350ba5e2e1359a180ce3b0fc55dcaafab5c68b1e64af1223d5ce3605ae784316"]}) close(r3) close(r2) 17:57:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xa000000) 17:57:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x4088ffffffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8948, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x5452, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a180f0000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2108.070037][T18380] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="280000000200000085cfcf079da139444301585b95bacdc852805f13811a37a1d210ed8d407210943cf21685b41305518932a92f1491c4526c36060c06"]}) close(r2) close(r1) 17:57:00 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x5460, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xf0ffffffffffff, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8949, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a20100000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xe000000) [ 2108.512550][T18414] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x894c, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a0f180000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) prctl$PR_GET_FP_MODE(0x2e) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="30c39380e6c46aa3"]}) close(r2) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x2, 0x18001) close(r1) 17:57:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x100000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8901, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xf000000) [ 2108.982538][T18456] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8970, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8902, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x24, r3, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x89}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004}, 0x10) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r4) close(r2) 17:57:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x200000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a001f0000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8971, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2109.452264][T18488] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00200000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8903, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x300000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x80, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000300)={0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000006c0)={0xdc, 0x0, &(0x7f0000000540)=[@transaction_sg={0x40486311, {{0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48, 0x20, &(0x7f0000000240)=[@ptr={0x70742a85, 0x0, &(0x7f0000000200), 0x1, 0x3, 0x21}, @fda={0x66646185, 0x6, 0x4, 0x1a}], &(0x7f00000002c0)=[0x30, 0x58, 0x20, 0x38]}, 0x8}}, @reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x50, &(0x7f0000000340)=[@flat={0x77682a85, 0x1, r3, 0x4}, @fd={0x66642a85, 0x0, r1, 0x0, 0x2}, @fda={0x66646185, 0x9, 0x3, 0x17}], &(0x7f00000003c0)=[0x38, 0x28, 0x30, 0x78, 0x38, 0x58, 0x48, 0x0, 0x78, 0x28]}}, @transaction_sg={0x40486311, {{0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x58, 0x38, &(0x7f0000000480)=[@ptr={0x70742a85, 0x1, &(0x7f0000000440), 0x1, 0x0, 0xe}, @fd={0x66642a85, 0x0, r0, 0x0, 0x1}, @fd={0x66642a85, 0x0, r0, 0x0, 0x3}], &(0x7f0000000500)=[0x68, 0x48, 0x0, 0x0, 0x48, 0x40, 0x28]}, 0x4}}], 0x59, 0x0, &(0x7f0000000640)="56f990df99ab76fb52002d4ff86f565f376b53be467903197755bdad400abc994e69e711ff046d762c56ebc6a4f03bbaa002c18a44b0cb60b28a51f875ae5361821676fac03bde11e57568b7c05c172a2de98d3de86870f101"}) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) fgetxattr(r0, &(0x7f0000000100)=@known='com.apple.FinderInfo\x00', &(0x7f0000000140)=""/49, 0x31) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000013e95), 0x4) r6 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x40001) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') ioctl$VHOST_SET_VRING_CALL(r6, 0x4008af21, &(0x7f00000000c0)={0x3, r7}) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="efe2951a81dc"]}) close(r5) close(r2) 17:57:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x10000000) 17:57:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8980, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2109.857449][T18527] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a10200000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) lsetxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@ng={0x4, 0x1, "e61065cfbe6c8c0efa"}, 0xb, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x2, 0x0) read$eventfd(r3, &(0x7f0000000140), 0x8) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x180, 0x0) close(r1) 17:57:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8904, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x400000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8981, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8906, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2110.277107][T18564] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00230000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x11000000) 17:57:02 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8982, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8907, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a003f0000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x500000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:03 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8983, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00400000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x890b, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2200, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x9) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r1) 17:57:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x600000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:03 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8990, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x1f000000) 17:57:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00480000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x890c, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2111.416000][T18646] validate_nla: 3 callbacks suppressed [ 2111.416012][T18646] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x700000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:03 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8992, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) msgget(0x2, 0x1) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a004c0000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8910, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2111.764360][T18674] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00680000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8911, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8993, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x20000000) 17:57:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000080)=0x5e0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x800000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) mmap(&(0x7f0000011000/0x1000)=nil, 0x1000, 0x2, 0x50013, r0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r2) [ 2112.301071][T18719] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a006c0000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8912, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:04 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8994, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x900000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="28000025520c51f0badf150a22e2e42f5c8cf5e668c66f04b98a1d31204a005443900000c9f3b5a46400000000"]}) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x220140) ioctl$TIOCSTI(r4, 0x5412, 0x3) close(r3) close(r2) 17:57:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00740000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8913, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x20003bc0) [ 2112.841520][T18759] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8995, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="28000000020000009ef86990d1561539e2d34fb767567171ebb7ae4eae9b7ecb546403433eb9a817ed8631d1b9212ae3e235ae92dd5a1619e97e58306f8ff90d17bdc9af0e78d53c4b0290c6d6d9d127f549db2f11335ae0c084ba49d37feede9e861ecbb0e7f98dc08c22fbfe73915ecf48824c28f52a03ea48e1b68aadb4aadd0481b0173c6781fc23aecda1bb512d370a4cfa0e60d9ec8bb62051190c0d22d71e4690395430fc904cf21c3544bfce2e447c5d8437af57f3a1f4f849c4e0c97ce7a7047db5e22818655cc8ebbe6ea09b1c368dc1e579698fc8447e4b32a58b7efa54300af5577f1a8daaf8c97ce9c4d544f58ebffe662297d6"]}) close(r2) close(r1) 17:57:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a007a0000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2113.046332][T18781] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8914, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa00000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89a0, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2113.328801][T18807] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r2) 17:57:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363ac0ed0000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x23000000) 17:57:05 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89a1, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8916, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xc00000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a0fff0000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89a2, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2113.889999][T18850] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000400000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8918, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xe00000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x25000000) [ 2114.289237][T18876] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2, 0x0) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000140)=0x44) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) fchmod(r1, 0x42) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r0) close(r1) 17:57:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89a3, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00001000000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x891d, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x1000000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89b0, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x891e, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2114.747500][T18915] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000001000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x26000000) 17:57:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x180f000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x8040, 0x0) getsockopt$inet_buf(r2, 0x0, 0x23, &(0x7f0000000080), &(0x7f00000000c0)) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r1) 17:57:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x40049409, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x891f, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000002000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2115.245978][T18952] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6(0xa, 0x1, 0xffff) mmap(&(0x7f0000012000/0x1000)=nil, 0x1000, 0x100000e, 0x4013, r0, 0x1) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x1f00000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x4020940d, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8920, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x27000000) 17:57:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000003000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:08 executing program 1: socketpair$unix(0x1, 0x4000000000000006, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) r4 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x2802) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000140)={0x0, 0x3f, 0xffffffffffffffff, 'queue0\x00', 0x1800000000000000}) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x2, 0x2, 0x80000000, 0x7, 0x7, 0x0, 0x7, 0x4, 0xc4, 0xfff, 0x3}, 0xb) close(r2) 17:57:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8921, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0xc0045878, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x2000000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000004000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000001340)=[{{&(0x7f0000000080)=@nl=@unspec, 0x80, &(0x7f0000000500)=[{&(0x7f0000000140)=""/137, 0x89}, {&(0x7f0000000000)=""/6, 0x6}, {&(0x7f0000000200)=""/246, 0xf6}, {&(0x7f0000000300)=""/65, 0x41}, {&(0x7f0000000380)=""/111, 0x6f}, {&(0x7f0000000400)=""/231, 0xe7}], 0x6, &(0x7f0000000580)=""/96, 0x60}, 0x5f90d5d0}, {{&(0x7f0000000600)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000680)=""/105, 0x69}, {&(0x7f0000000700)=""/131, 0x83}, {&(0x7f00000007c0)=""/14, 0xe}, {&(0x7f0000000800)=""/220, 0xdc}, {&(0x7f0000000900)=""/156, 0x9c}, {&(0x7f00000009c0)=""/16, 0x10}, {&(0x7f0000000a00)=""/219, 0xdb}, {&(0x7f0000000b00)=""/43, 0x2b}, {&(0x7f0000000b40)=""/31, 0x1f}], 0xa, &(0x7f0000000c40)=""/55, 0x37}, 0x5}, {{&(0x7f0000000c80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000d00)=""/212, 0xd4}, {&(0x7f0000000e00)}, {&(0x7f0000000e40)=""/17, 0x11}, {&(0x7f0000000e80)=""/149, 0x95}, {&(0x7f0000000f40)=""/49, 0x31}, {&(0x7f0000004000)=""/4096, 0x1000}, {&(0x7f0000000f80)=""/160, 0xa0}], 0x7, &(0x7f00000010c0)=""/66, 0x42}, 0x9}, {{&(0x7f0000001140)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001300)=[{&(0x7f00000011c0)=""/241, 0xf1}, {&(0x7f00000012c0)}], 0x2, &(0x7f0000005000)=""/4096, 0x1000}, 0x400}], 0x4, 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x0, 0x4) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000001440)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001480)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x3}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) getsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f0000000e00), &(0x7f00000012c0)=0x4) close(r3) close(r2) 17:57:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x29000000) 17:57:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000005000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8922, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0xc0045878, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x3f00000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) [ 2116.669246][T19056] validate_nla: 2 callbacks suppressed [ 2116.669255][T19056] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000006000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2116.860035][T19072] veth1_to_bond: mtu greater than device maximum 17:57:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0xc0189436, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2116.926487][T19065] veth1_to_bond: mtu greater than device maximum 17:57:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x4000000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8923, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000007000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0xc020660b, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2117.202532][T19098] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) socket$nl_generic(0x10, 0x3, 0x10) 17:57:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2a000000) 17:57:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000008000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8924, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x4800000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00?', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2117.731953][T19135] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000009000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8927, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000010000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x0f\xff', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x20080) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000140)={[0x3, 0x233, 0x0, 0x100000001, 0x1, 0x40, 0x8, 0x0, 0x7fffffff, 0x7, 0x0, 0x7, 0x6, 0x2, 0x1ff, 0x1], 0x5000, 0x102}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r2) 17:57:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x4c00000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2b000000) 17:57:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x10000, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x608002) open(&(0x7f00000000c0)='./file0\x00', 0x1d9100, 0x40) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xbd, 0x105000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000f18000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2118.322016][T19179] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8929, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a0000001f000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) keyctl$set_reqkey_keyring(0xe, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400, 0x0) write$P9_RLINK(r3, &(0x7f0000000080)={0x7, 0x47, 0x1}, 0x7) close(r2) close(r1) 17:57:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x6000000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8930, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x49040000) 17:57:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000020000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2118.894309][T19226] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00001020000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:11 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x80, 0x48840) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080)=0x2, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r1) 17:57:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8932, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2119.194257][T19248] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100), &(0x7f00000001c0)=0x10) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) r3 = shmget(0x1, 0x3000, 0x4, &(0x7f0000011000/0x3000)=nil) shmctl$IPC_RMID(r3, 0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = open(&(0x7f0000000080)='./file0\x00', 0x200080, 0x0) getsockopt$netrom_NETROM_T4(r5, 0x103, 0x6, &(0x7f00000000c0)=0x1, &(0x7f0000000140)=0x4) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="286c2c7a16245920f3197258c1d477c990357d2576792a63f0"]}) close(r4) close(r2) 17:57:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x6558000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000023000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:11 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8933, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x60000000) [ 2119.673929][T19280] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x6800000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a0000003f000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8936, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) fsetxattr(r1, &(0x7f0000000280)=@known='trusted.overlay.redirect\x00', &(0x7f00000002c0)='/dev/cec#\x00', 0xa, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) socket$isdn_base(0x22, 0x3, 0x0) r4 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x9, 0x2, 0x6, 0x7, 0x6}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r5, 0x3}, &(0x7f0000000240)=0x8) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="280000000208898a4ab5b4cb7dc28d021291dc55000000"]}) close(r0) open(&(0x7f0000000000)='./file0\x00', 0x42, 0x4) close(r2) [ 2120.087218][T19310] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="7b798f3009d76333e2cdb358799301af37fb3b22be140f8ab5f0557d666b93eec78a3a2018a88777854fd749ec066bbaaf65f209b1c18f4f9663f83a77e734651c33779ae792c42954d567d4ee411e61718fd90153bb41969ca417dbb909dd091e12a5ddc1bc029b9a965a0a00164a98588051df7d7159e1869764b6cccf05874e1a9b2daab24fd3ca730c66a9f4af01ed32587e6d1ab82e084c365f3077467ee514983aece9a7c968669e729e1686dca41e"]}) close(r2) close(r1) 17:57:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000040000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8937, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2120.334068][T19338] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:12 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x7fffebdb) 17:57:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x6c00000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x80000000000007, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="db21a03d703f0f54fc3a34d20028000000ea000000"]}) close(r2) close(r1) 17:57:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000048000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8940, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) [ 2120.681086][T19366] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a0000004c000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x20, 0x82) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000140)={0x0, @reserved}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r2) 17:57:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x7400000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8941, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00\x0f', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x7ffff000) 17:57:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0300000000000000"]}) close(r2) close(r1) 17:57:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000068000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:13 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8942, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x7a00000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:13 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a0000006c000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8943, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x7f95010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x80ffffff) 17:57:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:14 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, 0xffffffffffffffff, 0x303) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="283464b89ffd0000"]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20000, 0x0) close(r2) close(r1) 17:57:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000074000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xa5030000) [ 2122.009674][T19480] validate_nla: 2 callbacks suppressed [ 2122.009684][T19480] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a0000007a000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8095010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xbfffffff) 17:57:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000000)=@ethtool_gfeatures={0x3a, 0x3, [{0x7fffffff, 0x1, 0xffffffffffffff80, 0x5}, {0x4, 0x1ff, 0x40, 0xffffffff}, {0x0, 0x5, 0x80000000, 0x7}]}}) close(r2) close(r1) 17:57:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8947, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363affffff8c000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2122.549267][T19520] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xc03b0020) 17:57:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8100000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8948, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363affffff97000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:15 executing program 1: socketpair$unix(0x1, 0x10001, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xc0ffffff) [ 2123.004824][T19560] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a0000edc0000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8949, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xc3ff0000) 17:57:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x34, 0x2}}) close(r2) close(r1) 17:57:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8195010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363afffffff4000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x894c, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2123.590241][T19614] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xdbebff7f) 17:57:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363afffffff5000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2, 0x2}}) close(r2) close(r1) 17:57:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x111200, 0x100) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000140)=""/4096) r2 = userfaultfd(0x802) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000014000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r2) 17:57:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8970, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8295010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xe8030000) 17:57:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363afffffff6000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) clock_gettime(0x0, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$FUSE_OPEN(r3, &(0x7f00000000c0)={0x20, 0x0, 0x4, {0x0, 0x2}}, 0x20) dup2(r2, r2) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0100000000000000"]}) close(r2) close(r1) fcntl$setlease(r0, 0x400, 0x2) 17:57:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3, 0x2}}) close(r2) close(r1) [ 2124.229350][T19660] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363afffffdf9000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xeffdffff) 17:57:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8971, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000000)={0x0, 0x7, 0x80000001, 0x3}) close(r2) close(r1) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x301000, 0x0) getsockopt$nfc_llcp(r3, 0x118, 0x4, &(0x7f0000000140)=""/209, 0xd1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x1, 0x20, 0x3f, 0xffffffffffffff80}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000280)={r4, 0x800, 0x30}, &(0x7f00000002c0)=0xc) 17:57:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8395010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:16 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4, 0x2}}) close(r2) close(r1) 17:57:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363afffffffb000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2124.696888][T19705] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xf4010000) 17:57:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8980, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363afffffdfc000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x5, 0x2}}) close(r2) close(r1) 17:57:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8495010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xfffffdef) [ 2125.227124][T19748] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363afffffdfd000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:17 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8981, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:17 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x6, 0x2}}) close(r2) close(r1) 17:57:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa, 0x4}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="2800000002f80000"]}) close(r2) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x8a000) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000008}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xc4, r4, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xbfa}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lapb0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2fa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x615}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0xc4}, 0x1, 0x0, 0x0, 0x8010}, 0x800) close(r1) socketpair(0x1, 0x4, 0xf8ef, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$llc(r5, &(0x7f0000000140)=""/146, 0x92, 0x10102, 0x0, 0x0) 17:57:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xffffff7f) 17:57:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8595010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363afffffffd000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8982, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2125.700990][T19787] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:18 executing program 1: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x7, 0x2}}) close(r2) close(r1) 17:57:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xffffff80) 17:57:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8695010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000fff000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8983, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2126.124811][T19828] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xffffffbf) 17:57:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x8, 0x2}}) close(r2) close(r1) 17:57:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363af9fdffff000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8990, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8795010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xffffffc0) 17:57:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000000)={0x2, 0x5}) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x10a) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000140)=""/4096) 17:57:18 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x9, 0x2}}) close(r2) close(r1) [ 2126.640895][T19872] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363afcfdffff000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8992, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x7ffffffff000) 17:57:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xa01a02dceb3b7a70, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x2) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="80fd7eec89599f0000000000a49edf4720e2eaeb282d3f68390a7824186c4edf115e7cf6a3aebedebdc747c40dbfa1b39308e42a403ba509f316735b29c0f31d5b4ee363ca4c23435a8c9eed5613a717566fb9d98578ea0542a2b80db2f083068aaa4025b5e0f5da48f1380a1416bb55043593e79c016c0eaedd9be923d03d7eb44b6b52f0679704b9f30ada0112ff00dac31ced719c29044f95dbb4bbdd1e7547f82f46d298adeb8c56f19878560b650b845e51b83b59768fa1b23c1ad0568513af22a0113869542cd714cf0495bd1f1ec4255807ee44e656ca616423cd427bf837e05b48b98cc24f4d103d71319f378b396ee7487fd6cb56"]}) close(r1) ftruncate(r1, 0x81) close(r1) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000180)={0x20, {{0xa, 0x4e22, 0x48000, @rand_addr="e9993fa1e228c80e5c9938826ef2822f", 0x5}}}, 0x88) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x8, 0xc00) 17:57:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8895010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0xa, 0x2}}) close(r2) close(r1) 17:57:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8993, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363afdfdffff000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x4000000000000) 17:57:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r2) [ 2127.203389][T19918] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:19 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0xb, 0x2}}) close(r2) close(r1) 17:57:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a8cffffff000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x88a8ffff00000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:19 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8994, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2127.624357][T19957] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a97ffffff000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r2) 17:57:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0xc, 0x2}}) close(r2) close(r1) 17:57:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8995, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x40030000000000) 17:57:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8995010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363af4ffffff000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2128.043664][T19996] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89a0, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:20 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0xe, 0x2}}) close(r2) close(r1) 17:57:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8a95010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363af5ffffff000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xf0ff7f00000000) 17:57:20 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89a1, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2128.496216][T20025] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x200000, 0x0) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363af6ffffff000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0xf, 0x2}}) close(r2) close(r1) 17:57:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8b95010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89a2, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2128.936369][T20057] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363afbffffff000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) ioctl$NBD_SET_SIZE(r1, 0xab02, 0xe6) close(r2) close(r1) 17:57:21 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x10, 0x2}}) close(r2) close(r1) 17:57:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xf0ffffff7f0000) 17:57:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8c13000000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89a3, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363afdffffff000000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) [ 2129.435983][T20099] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x100000000000000) 17:57:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000100000000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89b0, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2129.681827][T20121] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x11, 0x2}}) close(r2) close(r1) 17:57:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8c95010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000200)) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) r3 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x7fff, 0x410800) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000140)={r4, 0x3f, 0x1, [0x9000000000]}, &(0x7f0000000180)=0xa) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r5) close(r1) epoll_create(0xd8) 17:57:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000c0ed00000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x40049409, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x12, 0x2}}) close(r2) close(r1) [ 2130.135765][T20144] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000001000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x200000000000000) 17:57:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(0xffffffffffffffff, 0x80045700, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) mlockall(0x1) syz_open_dev$vivid(0x0, 0xffffffffffffffff, 0x2) lseek(r2, 0x0, 0x4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]}) close(r1) 17:57:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x4020940d, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8d95010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x13, 0x2}}) close(r2) close(r1) [ 2130.618987][ T26] audit: type=1804 audit(1548784642.910:68): pid=20180 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir950291304/syzkaller.4VMqKv/3587/bus" dev="sda1" ino=16784 res=1 [ 2130.766250][T20190] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0xc0045878, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000004000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x14, 0x2}}) close(r2) close(r1) 17:57:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0xc0045878, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8e95010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x300000000000000) 17:57:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363affffffffffff07000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2131.512896][T20233] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x15, 0x2}}) close(r2) close(r1) 17:57:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x480000, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x53}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r2) 17:57:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0xc0189436, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000010000000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x400000000000000) 17:57:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x8f95010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:24 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x16, 0x2}}) close(r2) close(r1) 17:57:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000010000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:24 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x17, 0x2}}) close(r2) close(r1) 17:57:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0xc020660b, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001ff) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) r2 = getgid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r4, 0xb10, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0xe76}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x80) getresgid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) setgroups(0x3, &(0x7f0000000280)=[r2, r3, r5]) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000400)={'gretap0\x00', @link_local}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffffffffff00, 0x10181) close(r6) close(r1) 17:57:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9095010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) [ 2132.599067][T20308] validate_nla: 1 callbacks suppressed [ 2132.599076][T20308] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x500000000000000) 17:57:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000020000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:24 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x18, 0x2}}) close(r2) close(r1) 17:57:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00?', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x80, 0x0) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xff, 0x2000) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x4, 0x1, 0x1, 0x1, 0x0, 0x2, 0x44010, 0x2, 0x427, 0x100000000, 0x7fff, 0x8b5, 0xfffffffeffffffff, 0x4, 0x9, 0x3, 0x8, 0x1, 0x20, 0x1000, 0x80000000, 0x1, 0x5, 0x80, 0x8, 0x6, 0xffffffffffffffc0, 0x2148, 0x0, 0x1, 0x1d23, 0x85, 0x1, 0x1, 0xc50a, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0xffffffffffffbc39, 0x9}, 0x0, 0x2, 0x4, 0x0, 0x7fff, 0x1f, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xb2c6) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x6, 0x1, 0x5, 0xfffffffffffffff9, 0x100000001}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={r3, 0x4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9195010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000030000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x19, 0x2}}) close(r2) close(r1) 17:57:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x0f\xff', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2133.108052][T20350] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000040000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x1a, 0x2}}) close(r2) close(r1) 17:57:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9295010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x700000000000000) 17:57:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0', "319ea5c6f2d1a20032e07efb50f3f35c37e3f2d1c4aae4929f38696b22cfa0d786f4c41744d8f45ea651363cc6c19d4704e411c2e8c10d1ed8a172a276987abfa1796bdc6ebc3493e423deb2"}, 0x50) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2133.531678][T20383] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) rt_sigaction(0x2c, &(0x7f00000000c0)={&(0x7f0000000000)="660f10be0f000000c40341698efdf7187b8a660f7d29c441b9f68ed7260000c4818967f9f031948104000000f3a565f724bc6566470f7ee2c4c27d79f7", {0x3}, 0x4, &(0x7f0000000080)="66440f518eb50000008f2814a2f302f2ac83514b08c4a28996d0c4c3610c7949af360ff36a2d6536d28394b00000c4e37d1dd12765f083768e4e"}, &(0x7f0000000200)={&(0x7f0000000140)="c4228d97e72e3666460f7fe326450f2d8d06000000673ef3abc4217d6fb107000000c4015912affeffff1fc46291b8fd67f340ab66460f55820600000066660f65d9", {}, 0x0, &(0x7f00000001c0)="4681feca000000d9f6440fae65dc8f8978e30721c441ad66460f380511c4212dfddc26408f01c462cd4003"}, 0x8, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9395010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000050000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x1b, 0x2}}) close(r2) close(r1) 17:57:26 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2133.900046][T20409] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000060000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x1c, 0x2}}) close(r2) close(r1) 17:57:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9495010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)={0xaa, 0xffffffffffffffff}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r3, 0xc0285629, &(0x7f00000000c0)={0x0, 0xfffffffffffff8e6, 0x9, [], &(0x7f0000000080)=0x4}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) close(r2) close(r2) socket$caif_seqpacket(0x25, 0x5, 0x0) 17:57:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x800000000000000) 17:57:26 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\xff\xff', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2134.368291][T20447] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000070000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="280000fa0e16106b31c8c60000"]}) close(r2) close(r1) 17:57:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9595010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x1d, 0x2}}) close(r2) close(r1) 17:57:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000080000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x900000000000000) [ 2134.946223][T20492] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000090000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x1e, 0x2}}) close(r2) close(r1) 17:57:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\xfd\xfd', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2135.230211][T20512] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9695010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x400000, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x1, 0x1, 0x0, 0x81, 0x0, 0x6e0, 0x0, 0x6, 0x8, 0x1, 0x7f, 0x9, 0xff0000000000000, 0x401, 0x6, 0x7, 0x9, 0x4, 0x5, 0x6, 0x9, 0xfffffffffffffff7, 0x8, 0x9, 0x80000000, 0x2, 0x9, 0x1, 0x4, 0x8, 0x9, 0x9, 0x8001, 0xfffffffffffffffb, 0x2, 0x0, 0x0, 0xffffffffab376579, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x880, 0xa868, 0xdf, 0x1, 0x7, 0xfffffffffffffffd, 0x1f}, 0xffffffffffffffff, 0xd, r1, 0x1) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r2) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f0000000180)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null}) 17:57:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x21, 0x2}}) close(r2) close(r1) 17:57:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xa00000000000000) 17:57:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a0000000000000f180000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2135.624697][T20538] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000140)) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x10000) close(r0) [ 2135.827488][T20541] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x23, 0x2}}) close(r2) close(r1) 17:57:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9795010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a000000000000001f0000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2136.132781][T20577] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:28 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9895010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xe00000000000000) 17:57:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x24, 0x2}}) close(r2) close(r1) 17:57:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000200000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:29 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9995010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x17c) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x25, 0x2}}) close(r2) close(r1) 17:57:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0xf00000000000000) 17:57:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000010200000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:29 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000230000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:29 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x26, 0x2}}) close(r2) close(r1) 17:57:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80004) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7, 0x101) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000040)=0x1, &(0x7f0000000080)=0x4) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r3, 0x40086610, &(0x7f0000000080)) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) close(r4) close(r1) 17:57:29 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9a95010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x1000000000000000) 17:57:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000080)={0x1000, 0x0, {0xffffffffffffffff, 0x1, 0x101, 0x2, 0x3ff}}) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r2) 17:57:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x27, 0x2}}) close(r2) close(r1) 17:57:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a000000000000003f0000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00\x0f', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9b95010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r3, 0xc004aea7, &(0x7f0000000080)=0x8001) close(r2) close(r1) [ 2137.996261][T20715] validate_nla: 3 callbacks suppressed [ 2137.996272][T20715] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000400000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x1100000000000000) [ 2138.212198][T20729] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9c95010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x40) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r2) close(r1) 17:57:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000480000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x29, 0x2}}) close(r2) close(r1) 17:57:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2138.574725][T20760] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400800, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfff, 0x101000) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="280000001cae5300"]}) close(r4) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000080)={0x0, 0x0, {0x2e, 0x11, 0x11, 0x1d, 0x3, 0x48cf, 0x6, 0x167, 0x1}}) close(r1) 17:57:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a000000000000004c0000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x1f00000000000000) 17:57:31 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="2800000002000001989207bb952352426c21af92f624fafe9a6a2dde2af202c93640c3677d8996d36b444eb099fefe00383d04b1e7c3c0c3363b91e6c77474ff59"]}) close(r1) close(r0) 17:57:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9d95010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00\xff', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2a, 0x2}}) close(r2) close(r1) 17:57:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000680000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2139.170059][T20808] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a000000000000006c0000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'b\x03\x00\xe2\x01\x00\x00\x00\xc19Bev\b\x01\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']}) close(r2) close(r1) 17:57:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2b, 0x2}}) close(r2) close(r1) 17:57:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:31 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9e95010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2000000000000000) [ 2139.604584][T20845] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2c, 0x2}}) close(r2) close(r1) 17:57:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000740000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00\xfd', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9effffff00000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000013000/0x4000)=nil, 0x4000, 0x4, 0x34, r0, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) close(r2) 17:57:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2d, 0x2}}) close(r2) close(r1) 17:57:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a000000000000007a0000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2140.081907][T20885] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2300000000000000) 17:57:32 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80000) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x100, 0x0) openat$cgroup_ro(r2, &(0x7f0000000080)='memory.swap.current\x00', 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0xffffffffffffffa7) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x7, @remote, 0x2}, @in6={0xa, 0x4e22, 0x6, @ipv4={[], [], @broadcast}, 0x6}, @in6={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, [], 0x19}, 0x9}, @in6={0xa, 0x4e20, 0x6, @remote, 0x3}], 0x70) close(r3) close(r1) 17:57:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363affffffffffffff7f0000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x30, 0x2}}) close(r2) close(r1) 17:57:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x9f95010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) [ 2140.595102][T20931] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="2873173dde40b1726026c1b02a7bf841fdec9055e4dd8ea564b45546457344223390e16ae0dc298dd5f4d34fe33e8ba02b1e0e3f5b71493f8205bcfb0a43c6c30bdd443d"]}) close(r2) close(r1) 17:57:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000000000800000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x31, 0x2}}) close(r2) close(r1) 17:57:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2500000000000000) [ 2140.900578][T20952] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000ffffff8c0000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x8001, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000240)="c2aab415d7a217b441e8269e1315b7696ef9c26de61d8c4a87c688a19bd8aefa688f31a55feb53206cc6023f3fb3400f8d3e97ad8f7049a442240bf3f8d6374f84d609275a89f9f5dc767dcbef66708eb65309c9190995907c2b55c23de29d01ce80d690fc066e983898b9cbf224fb4b61c0") r3 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x28, 0x2}}) close(r3) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="04000100190eaaaaaa1f"]) write$FUSE_OPEN(r4, &(0x7f00000000c0)={0x20, 0xfffffffffffffff5, 0x2, {0x0, 0x1}}, 0x20) close(r4) 17:57:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa095010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x32, 0x2}}) close(r2) close(r1) 17:57:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) [ 2141.239684][T20981] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000ffffff970000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2600000000000000) 17:57:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x33, 0x2}}) close(r2) close(r1) [ 2141.499286][T20981] netlink: 'syz-executor0': attribute type 22 has an invalid length. 17:57:33 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa195010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000fffffff40000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x37, 0x2}}) close(r2) close(r1) 17:57:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000fffffff50000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2700000000000000) 17:57:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x484, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r2, &(0x7f0000000700), 0x10000000000000a5) 17:57:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x2, 0x2}}) close(r2) close(r1) 17:57:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x38, 0x2}}) close(r2) close(r1) 17:57:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa295010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000fffffff60000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3, 0x2}}) close(r2) close(r1) 17:57:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2900000000000000) 17:57:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x39, 0x2}}) close(r2) close(r1) 17:57:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa395010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000fffffdf90000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x4, 0x2}}) close(r2) close(r1) 17:57:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000fffffffb0000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) mkdir(&(0x7f0000027000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x484, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r2, &(0x7f0000000700), 0x10000000000000a5) 17:57:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x3a, 0x2}}) close(r2) close(r1) 17:57:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0xa495010000000000, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x16}]}}}]}, 0x3c}}, 0x0) 17:57:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000fffffdfc0000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) 17:57:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=@ethtool_sfeatures={0x5, 0x2}}) close(r2) close(r1) 17:57:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x2) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) write$binfmt_script(r2, &(0x7f0000000280)=ANY=[@ANYBLOB='w'], 0x1) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x2a00000000000000) [ 2143.477579][T21147] validate_nla: 4 callbacks suppressed [ 2143.477590][T21147] netlink: 'syz-executor0': attribute type 22 has an invalid length. [ 2143.554788][T21157] ================================================================== [ 2143.563325][T21157] BUG: KASAN: null-ptr-deref in reclaim_high.constprop.0+0xa6/0x1e0 [ 2143.563340][T21157] Read of size 8 at addr 0000000000000138 by task syz-executor1/21157 [ 2143.563344][T21157] [ 2143.563360][T21157] CPU: 1 PID: 21157 Comm: syz-executor1 Not tainted 5.0.0-rc4-next-20190129 #21 [ 2143.563368][T21157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2143.563373][T21157] Call Trace: [ 2143.563398][T21157] dump_stack+0x1db/0x2d0 [ 2143.563417][T21157] ? dump_stack_print_info.cold+0x20/0x20 [ 2143.563432][T21157] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 2143.563451][T21157] ? vprintk_func+0x86/0x189 [ 2143.563471][T21157] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 2143.601000][T21157] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 2143.601021][T21157] kasan_report.cold+0x5/0x40 [ 2143.601040][T21157] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 2143.601057][T21157] check_memory_region+0x123/0x190 [ 2143.601078][T21157] kasan_check_read+0x11/0x20 [ 2143.620027][T21157] reclaim_high.constprop.0+0xa6/0x1e0 [ 2143.620044][T21157] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2143.620061][T21157] ? memcg_oom_wake_function+0x6b0/0x6b0 [ 2143.620076][T21157] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2143.620098][T21157] ? syscall_return_slowpath+0x519/0x5f0 [ 2143.672346][T21157] ? trace_hardirqs_off_caller+0x300/0x300 [ 2143.672363][T21157] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2143.672378][T21157] ? retint_kernel+0x2d/0x2d [ 2143.672407][T21157] mem_cgroup_handle_over_high+0xc1/0x180 17:57:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000280)="8da4363a00000000fffffdfd0000004d0100000000000000000000000000000aecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000060000005f42485266535f4dd2f873574f257e0a01e2a6a02f327ae815816e16250bcfa6784990ae257a2d03a91bd2f01ec2f4df0ed19f5e9aeef8d534eec3aeab9868d5d4bb6fe4f4ede859c8da3a446e552744cbb31ce7f4891c5b9fc95f2d018ccf4ab0cf2f6266ba90a2252c721e08ac0a27a58585911b3134a508f03afa0add", 0xbe, 0x10000}], 0x0, 0x0) [ 2143.672427][T21157] exit_to_usermode_loop+0x299/0x3b0 [ 2143.672440][T21157] ? ret_from_fork+0x15/0x50 [ 2143.672455][T21157] ? syscall_trace_enter+0x12a0/0x12a0 [ 2143.672470][T21157] ? _raw_spin_unlock_irq+0x28/0x90 [ 2143.672484][T21157] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2143.672506][T21157] syscall_return_slowpath+0x519/0x5f0 [ 2143.672546][T21157] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2143.696352][T21147] kobject: 'tx-11' (000000008b541edd): fill_kobj_path: path = '/devices/virtual/net/bond1937/queues/tx-11' [ 2143.699290][T21157] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2143.699311][T21157] ret_from_fork+0x15/0x50 [ 2143.699324][T21157] RIP: 0033:0x45665a [ 2143.699349][T21157] Code: Bad RIP value. [ 2143.699365][T21157] RSP: 002b:00007ffe39d5aae0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2143.735003][T21147] kobject: 'tx-12' (000000006209de32): kobject_add_internal: parent: 'queues', set: 'queues' [ 2143.736314][T21157] RAX: 0000000000000000 RBX: 00007ffe39d5aae0 RCX: 000000000045665a [ 2143.736323][T21157] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2143.736333][T21157] RBP: 00007ffe39d5ab20 R08: 0000000000000001 R09: 0000000002275940 [ 2143.736342][T21157] R10: 0000000002275c10 R11: 0000000000000246 R12: 0000000000000001 [ 2143.736351][T21157] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 [ 2143.736375][T21157] ================================================================== [ 2143.736386][T21157] Disabling lock debugging due to kernel taint [ 2143.738230][T21157] Kernel panic - not syncing: panic_on_warn set ... [ 2143.768314][T21147] kobject: 'tx-12' (000000006209de32): kobject_uevent_env [ 2143.771025][T21157] CPU: 1 PID: 21157 Comm: syz-executor1 Tainted: G B 5.0.0-rc4-next-20190129 #21 [ 2143.771034][T21157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2143.771038][T21157] Call Trace: [ 2143.771060][T21157] dump_stack+0x1db/0x2d0 [ 2143.771081][T21157] ? dump_stack_print_info.cold+0x20/0x20 [ 2143.810745][T21147] kobject: 'tx-12' (000000006209de32): fill_kobj_path: path = '/devices/virtual/net/bond1937/queues/tx-12' [ 2143.813583][T21157] panic+0x2cb/0x65c [ 2143.813600][T21157] ? add_taint.cold+0x16/0x16 [ 2143.813615][T21157] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 2143.813629][T21157] ? preempt_schedule+0x4b/0x60 [ 2143.813644][T21157] ? ___preempt_schedule+0x16/0x18 [ 2143.813659][T21157] ? trace_hardirqs_on+0xb4/0x310 [ 2143.813679][T21157] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 2143.831672][T21147] kobject: 'tx-13' (00000000c1062235): kobject_add_internal: parent: 'queues', set: 'queues' [ 2143.837696][T21157] end_report+0x47/0x4f [ 2143.837711][T21157] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 2143.837726][T21157] kasan_report.cold+0xe/0x40 [ 2143.837741][T21157] ? reclaim_high.constprop.0+0xa6/0x1e0 [ 2143.837755][T21157] check_memory_region+0x123/0x190 [ 2143.837777][T21157] kasan_check_read+0x11/0x20 [ 2143.977377][T21157] reclaim_high.constprop.0+0xa6/0x1e0 [ 2143.982843][T21157] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2143.988135][T21157] ? memcg_oom_wake_function+0x6b0/0x6b0 [ 2143.993774][T21157] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2143.999349][T21157] ? syscall_return_slowpath+0x519/0x5f0 [ 2144.004994][T21157] ? trace_hardirqs_off_caller+0x300/0x300 [ 2144.010803][T21157] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2144.016106][T21157] ? retint_kernel+0x2d/0x2d [ 2144.020701][T21157] mem_cgroup_handle_over_high+0xc1/0x180 [ 2144.026427][T21157] exit_to_usermode_loop+0x299/0x3b0 [ 2144.031716][T21157] ? ret_from_fork+0x15/0x50 [ 2144.036332][T21157] ? syscall_trace_enter+0x12a0/0x12a0 [ 2144.041794][T21157] ? _raw_spin_unlock_irq+0x28/0x90 [ 2144.046999][T21157] ? lockdep_hardirqs_on+0x418/0x5d0 [ 2144.052309][T21157] syscall_return_slowpath+0x519/0x5f0 [ 2144.057807][T21157] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2144.063585][T21157] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2144.068785][T21157] ret_from_fork+0x15/0x50 [ 2144.073211][T21157] RIP: 0033:0x45665a [ 2144.077119][T21157] Code: Bad RIP value. [ 2144.081182][T21157] RSP: 002b:00007ffe39d5aae0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2144.089600][T21157] RAX: 0000000000000000 RBX: 00007ffe39d5aae0 RCX: 000000000045665a [ 2144.097579][T21157] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 2144.105565][T21157] RBP: 00007ffe39d5ab20 R08: 0000000000000001 R09: 0000000002275940 [ 2144.113552][T21157] R10: 0000000002275c10 R11: 0000000000000246 R12: 0000000000000001 [ 2144.121547][T21157] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 [ 2144.130600][T21157] Kernel Offset: disabled [ 2144.134928][T21157] Rebooting in 86400 seconds..